From 5748aefec6254a6bed4adf392952ec8fbb7c1f88 Mon Sep 17 00:00:00 2001 From: runner Date: Fri, 27 Mar 2026 01:15:52 +0000 Subject: [PATCH] Automatic updates from complyscribe --- .../component-definition.json | 5276 ++++++------ .../component-definition.json | 5168 ++++++------ .../component-definition.json | 7060 +++++++++-------- .../component-definition.json | 7002 ++++++++-------- .../component-definition.json | 22 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 760 +- .../component-definition.json | 644 +- .../component-definition.json | 824 +- .../component-definition.json | 2618 +++--- .../component-definition.json | 18 +- .../component-definition.json | 18 +- .../component-definition.json | 18 +- .../component-definition.json | 18 +- .../rhel8-e8-base/component-definition.json | 10 +- .../component-definition.json | 10 +- .../component-definition.json | 10 +- .../component-definition.json | 10 +- .../component-definition.json | 10 +- .../component-definition.json | 10 +- .../component-definition.json | 10 +- .../component-definition.json | 22 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 550 +- .../component-definition.json | 434 +- .../component-definition.json | 604 +- .../component-definition.json | 2606 +++--- 33 files changed, 16683 insertions(+), 17145 deletions(-) diff --git a/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json index 87b66d676..38f4608bd 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "77a62ff1-d5eb-47f8-a08f-063352e9479f", "metadata": { "title": "Component definition for fedora", - "last-modified": "2026-02-12T10:37:14.869542+00:00", - "version": "1.8", + "last-modified": "2026-03-27T01:42:42.267397+00:00", + "version": "1.9", "oscal-version": "1.1.3" }, "components": [ @@ -47,103 +47,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -155,67 +155,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -227,13 +227,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -245,13 +245,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -263,31 +263,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -299,49 +299,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -353,13 +353,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -371,31 +371,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -407,13 +407,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -425,13 +425,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -443,13 +443,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -461,13 +461,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -479,13 +479,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -497,13 +497,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -515,265 +515,265 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -785,234 +785,252 @@ { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_postfix_inet_interfaces", + "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for inet_interfaces in /etc/postfix/main.cf", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", + "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_screensaver_lock_delay", + "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", + "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", + "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_policy_name", + "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", + "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_max_sessions", + "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of open sessions permitted.", + "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", + "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_keepalive", + "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of idle message counts before session is terminated.", + "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", + "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_login_grace_time", + "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", + "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 60, 60: 60}", + "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_maxstartups", + "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", + "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", + "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sudo_timestamp_timeout", + "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", + "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_user_initialization_files_regex", + "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_user_initialization_files_regex", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" }, @@ -1355,3535 +1373,3547 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "disable_weak_deps", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_setroubleshoot_removed", + "value": "package_mcstrans_removed", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall setroubleshoot Package", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_setroubleshoot_removed", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall setroubleshoot Package", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "banner_etc_issue_cis", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_owner_etc_motd", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_permissions_etc_motd", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_owner_etc_issue", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "file_permissions_etc_issue", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_avahi-daemon_disabled", + "value": "service_autofs_disabled", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Avahi Server Software", + "value": "Disable the Automounter", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "service_avahi-daemon_disabled", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Disable Avahi Server Software", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_kea_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall kea Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_bind_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall bind Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "package_dnsmasq_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cups_disabled", + "value": "service_nfs_disabled", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the CUPS Service", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "service_cups_disabled", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Disable the CUPS Service", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_rsync_removed", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall rsync Package", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_samba_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall Samba Package", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_net-snmp_removed", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "package_squid_removed", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Uninstall squid Package", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_httpd_removed", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_nginx_removed", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Uninstall nginx Package", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_ftp_removed", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Remove ftp Package", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet_removed", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Remove telnet Clients", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "package_tftp_removed", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Remove tftp Daemon", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "package_cron_installed", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "service_crond_enabled", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Enable cron Service", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_groupowner_crontab", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_owner_crontab", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Owner on crontab", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_permissions_crontab", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Permissions on crontab", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_owner_cron_hourly", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", + "value": "file_owner_cron_daily", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.weekly", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_weekly", + "value": "file_owner_cron_weekly", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.weekly", + "value": "Verify Owner on cron.weekly", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_monthly", + "value": "file_permissions_cron_weekly", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.monthly", + "value": "Verify Permissions on cron.weekly", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_monthly", + "value": "file_groupowner_cron_monthly", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.monthly", + "value": "Verify Group Who Owns cron.monthly", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_monthly", + "value": "file_owner_cron_monthly", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.monthly", + "value": "Verify Owner on cron.monthly", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_yearly", + "value": "file_permissions_cron_monthly", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.yearly", + "value": "Verify Permissions on cron.monthly", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_yearly", + "value": "file_groupowner_cron_yearly", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.yearly", + "value": "Verify Group Who Owns cron.yearly", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_yearly", + "value": "file_owner_cron_yearly", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.yearly", + "value": "Verify Owner on cron.yearly", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_d", + "value": "file_permissions_cron_yearly", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.d", + "value": "Verify Permissions on cron.yearly", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_d", + "value": "file_groupowner_cron_d", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.d", + "value": "Verify Group Who Owns cron.d", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_d", + "value": "file_owner_cron_d", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.d", + "value": "Verify Owner on cron.d", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_deny_not_exist", + "value": "file_permissions_cron_d", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.deny does not exist", + "value": "Verify Permissions on cron.d", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_allow_exists", + "value": "file_cron_deny_not_exist", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.allow exists", + "value": "Ensure that /etc/cron.deny does not exist", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_allow", + "value": "file_cron_allow_exists", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/cron.allow file", + "value": "Ensure that /etc/cron.allow exists", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_allow", + "value": "file_groupowner_cron_allow", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/cron.allow file", + "value": "Verify Group Who Owns /etc/cron.allow file", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_allow", + "value": "file_owner_cron_allow", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/cron.allow file", + "value": "Verify User Who Owns /etc/cron.allow file", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_deny_not_exist", + "value": "file_permissions_cron_allow", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.deny does not exist", + "value": "Verify Permissions on /etc/cron.allow file", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_allow_exists", + "value": "file_at_deny_not_exist", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.allow exists", + "value": "Ensure that /etc/at.deny does not exist", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_at_allow", + "value": "file_at_allow_exists", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/at.allow file", + "value": "Ensure that /etc/at.allow exists", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_at_allow", + "value": "file_groupowner_at_allow", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/at.allow file", + "value": "Verify Group Who Owns /etc/at.allow file", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_at_allow", + "value": "file_owner_at_allow", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/at.allow file", + "value": "Verify User Who Owns /etc/at.allow file", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "wireless_disable_interfaces", + "value": "file_permissions_at_allow", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Deactivate Wireless Network Interfaces", + "value": "Verify Permissions on /etc/at.allow file", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_bluetooth_disabled", + "value": "wireless_disable_interfaces", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Bluetooth Service", + "value": "Deactivate Wireless Network Interfaces", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_atm_disabled", + "value": "service_bluetooth_disabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ATM Support", + "value": "Disable Bluetooth Service", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_can_disabled", + "value": "kernel_module_atm_disabled", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable CAN Support", + "value": "Disable ATM Support", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_dccp_disabled", + "value": "kernel_module_can_disabled", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable DCCP Support", + "value": "Disable CAN Support", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_tipc_disabled", + "value": "kernel_module_dccp_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable TIPC Support", + "value": "Disable DCCP Support", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_rds_disabled", + "value": "kernel_module_tipc_disabled", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable RDS Support", + "value": "Disable TIPC Support", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_forwarding", + "value": "kernel_module_rds_disabled", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", + "value": "Disable RDS Support", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding", + "value": "sysctl_net_ipv4_conf_all_forwarding", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", + "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_conf_default_forwarding", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians", + "value": "sysctl_net_ipv4_conf_all_log_martians", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies", + "value": "sysctl_net_ipv4_conf_default_log_martians", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", + "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding", + "value": "sysctl_net_ipv4_tcp_syncookies", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv6 Forwarding", + "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding", + "value": "sysctl_net_ipv6_conf_all_forwarding", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv6 Forwarding by default", + "value": "Disable Kernel Parameter for IPv6 Forwarding", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects", + "value": "sysctl_net_ipv6_conf_default_forwarding", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", + "value": "Disable Kernel Parameter for IPv6 Forwarding by default", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects", + "value": "sysctl_net_ipv6_conf_all_accept_redirects", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route", + "value": "sysctl_net_ipv6_conf_default_accept_redirects", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route", + "value": "sysctl_net_ipv6_conf_all_accept_source_route", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra", + "value": "sysctl_net_ipv6_conf_default_accept_source_route", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra", + "value": "sysctl_net_ipv6_conf_all_accept_ra", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", + "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nftables_installed", + "value": "sysctl_net_ipv6_conf_default_accept_ra", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install nftables Package", + "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", "remarks": "rule_set_165" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_nftables_installed", + "remarks": "rule_set_166" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Install nftables Package", + "remarks": "rule_set_166" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_323" } ], "control-implementations": [ { - "uuid": "e9e3e4ce-765d-40dc-9643-9397f76528de", + "uuid": "fcfcdf21-5503-48aa-93dd-c9b7d911a213", "source": "trestle://profiles/fedora-cis_fedora-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -4901,17 +4931,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -5227,7 +5263,7 @@ ], "implemented-requirements": [ { - "uuid": "80c07ba4-0d56-46ff-a1e8-4ffbf1aea35e", + "uuid": "0b3c5d24-44f1-4d32-a1e4-9f454d54d392", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5244,7 +5280,7 @@ ] }, { - "uuid": "674715b0-ce77-49c7-a823-ac4a50635b8c", + "uuid": "4aaafe64-57a7-4868-8bf7-ca4a6ab7bbf6", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5261,7 +5297,7 @@ ] }, { - "uuid": "b946e149-72b3-4f28-ab3e-20e5989450c4", + "uuid": "1dc8359c-f4c9-4c55-a4c0-29adbd1f85a4", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5278,7 +5314,7 @@ ] }, { - "uuid": "e005eb96-655d-4e9e-bd1b-2bff5fbb28c3", + "uuid": "49a0b417-1e04-499c-9148-4064e2050c86", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5295,7 +5331,7 @@ ] }, { - "uuid": "9d3c2685-22c4-4e4a-9b13-8154b1532ab0", + "uuid": "abff59bb-2f57-4ec5-b627-196fcebc3901", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5312,7 +5348,7 @@ ] }, { - "uuid": "ff114aa5-fe69-4414-9645-31a29574f584", + "uuid": "fc80b055-e68f-4090-9443-00b3626c8a47", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5329,7 +5365,7 @@ ] }, { - "uuid": "42b8c58e-be77-41a6-8bc0-23cb25ea920c", + "uuid": "4fa03c43-bf05-48b8-be55-0974d0404910", "control-id": "cis_fedora_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -5346,7 +5382,7 @@ ] }, { - "uuid": "2089bdf9-0640-4cea-acf1-9007f6091c70", + "uuid": "cea45142-7159-4455-a40c-ca76f1192d85", "control-id": "cis_fedora_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -5363,7 +5399,7 @@ ] }, { - "uuid": "ac740f36-01c2-42bc-93fe-4ed5e2ef23b7", + "uuid": "c87ff8be-b919-4987-ac3e-ce40726d1cfa", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -5376,7 +5412,7 @@ ] }, { - "uuid": "d537b594-7d55-4ea9-bd39-7c82d724ea15", + "uuid": "7613c1cb-ad07-40f8-a047-f216dae8c7e8", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5393,7 +5429,7 @@ ] }, { - "uuid": "92fce26c-e26f-4bbe-afe6-25822a23958d", + "uuid": "f73f6782-fb46-47fa-a12a-af6ead850733", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5410,7 +5446,7 @@ ] }, { - "uuid": "a58f8ce3-0345-43ab-a30d-4926576ec453", + "uuid": "501775b1-9ef2-4479-8691-b4d164e4e1a1", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5427,7 +5463,7 @@ ] }, { - "uuid": "0128286b-b7a1-45a3-874b-30fd7b34fd39", + "uuid": "d6b1791f-95d4-4a85-9fc7-942b205180bf", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5444,7 +5480,7 @@ ] }, { - "uuid": "4b1fdc38-75f9-4d3f-91a7-ef04fb3c7c4a", + "uuid": "bb12d334-0921-44ff-b1e8-09253c0afd8b", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5461,7 +5497,7 @@ ] }, { - "uuid": "c11e5e1c-f7ea-416d-beee-074a34450eb2", + "uuid": "c72c4648-8edd-4c96-aeb1-27189e97d391", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5478,7 +5514,7 @@ ] }, { - "uuid": "e8d69fbd-fa0d-426e-987a-fc9ee05cc86e", + "uuid": "8afce0db-3da8-4bed-91bb-e3d681d6eb27", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5495,7 +5531,7 @@ ] }, { - "uuid": "00a1a7d8-7649-41bd-88e1-d74b166a6bc9", + "uuid": "5adb8136-0cf1-4a4b-878e-110ef3c7f62a", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5512,7 +5548,7 @@ ] }, { - "uuid": "a4665a78-a92c-4a19-9a4c-c443b22d9f32", + "uuid": "c929b1d9-3f00-475a-91e2-cb945a4dc1cd", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5529,7 +5565,7 @@ ] }, { - "uuid": "2485906a-e06f-4eea-95be-e00e915dd659", + "uuid": "0d11323f-6975-4efb-b00d-bceb7dee980a", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5546,7 +5582,7 @@ ] }, { - "uuid": "3a00c735-cb41-4953-8780-1dc2a06a86c9", + "uuid": "13348301-62de-407c-b0a6-9cb806ba1ece", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5563,7 +5599,7 @@ ] }, { - "uuid": "6e9bf938-9dfc-4982-ba09-b365ef636dfc", + "uuid": "c3c188c1-a916-4b22-83e2-fc8821b1ab58", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5580,7 +5616,7 @@ ] }, { - "uuid": "85351d63-28e9-4be6-b9b6-134ed91c53c1", + "uuid": "2505acb7-9d95-4e3d-82ca-b02cb21313c8", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5597,7 +5633,7 @@ ] }, { - "uuid": "9172e7e6-2b76-422a-8fd8-64bb1e646c1e", + "uuid": "ff50784d-2268-43a1-b9ae-9045d1edce7f", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5614,7 +5650,7 @@ ] }, { - "uuid": "c3236468-94e5-425e-ad3a-95be15caf661", + "uuid": "8b54637e-bab1-4126-a43b-d1657a3aa8c6", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5631,7 +5667,7 @@ ] }, { - "uuid": "72a0dab4-d411-4a3b-81f3-fb0105bd93a2", + "uuid": "247aa98e-b596-4d01-99c8-7abddbe0ce8e", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5648,7 +5684,7 @@ ] }, { - "uuid": "dc50e03b-9693-406d-8773-d499e67df462", + "uuid": "4ca782e6-88ca-4be6-a7e7-ae78b6b359d7", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5665,7 +5701,7 @@ ] }, { - "uuid": "f5c928cc-5b70-4b26-944c-143bb67a9bab", + "uuid": "b0badf34-4034-44b0-8205-e68d68e15a0c", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5682,7 +5718,7 @@ ] }, { - "uuid": "750cc015-dc02-45cd-87ee-96ac09e3bd4e", + "uuid": "e4c7debc-cfb9-40ef-bf20-dd409fcc3dbb", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5699,7 +5735,7 @@ ] }, { - "uuid": "aca3c96c-4e6c-486b-a2a4-dfd083322776", + "uuid": "24524b6c-2024-458d-b954-ef39eb4ec85c", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5716,7 +5752,7 @@ ] }, { - "uuid": "5f64cd37-f55c-4713-8374-34d224af18fb", + "uuid": "5d0b766f-fc9d-4533-b668-9d713fa6580c", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5733,20 +5769,24 @@ ] }, { - "uuid": "501bf7b1-05c1-43df-9c38-7f33cf76b9ab", + "uuid": "61ae6df1-e948-40c4-b4c9-6d6ca8012aa0", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "e0af3f16-dbb1-4b40-bc9f-75a780e38c7d", + "uuid": "2033ac50-7f2a-4393-87bc-803a5cd96804", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5763,7 +5803,7 @@ ] }, { - "uuid": "b81d28d3-19c8-46d8-8c39-2c4374cddc52", + "uuid": "86a094a0-8ec8-44a1-a743-7f60772565c4", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -5776,7 +5816,7 @@ ] }, { - "uuid": "90fb5fc4-6e31-4d62-afcd-9bd6cfc9d108", + "uuid": "560ba932-f356-47cd-83e5-6f938101e1ca", "control-id": "cis_fedora_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -5793,7 +5833,7 @@ ] }, { - "uuid": "24534bf5-14f1-4445-8c4c-2560e8330cac", + "uuid": "1ed81ddc-48d7-4489-ae84-302515068a64", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -5806,7 +5846,7 @@ ] }, { - "uuid": "bc43c1d3-07f9-4318-af8c-8654dbae9dd6", + "uuid": "86ee20c7-b859-45b5-adfa-48b0fe59541f", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5823,7 +5863,7 @@ ] }, { - "uuid": "9d86360f-d2d5-4e2a-bc75-88b7181bca96", + "uuid": "655903ec-0ee1-4ff9-837c-7997123bfc98", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5840,7 +5880,7 @@ ] }, { - "uuid": "28b91d3f-7264-4191-975f-333f691be4d5", + "uuid": "266d008e-8dbe-4de9-a61e-1a76207986b5", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5857,7 +5897,7 @@ ] }, { - "uuid": "f87c211d-20ca-45af-b9ef-ad8980e8d2ed", + "uuid": "f47c3957-3220-4429-b49b-e69a4f6fdde5", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5874,7 +5914,7 @@ ] }, { - "uuid": "00e23738-a721-4408-9fa1-12bd5b2108ce", + "uuid": "024b1b7a-0c9a-43cd-8e73-2093c844b95b", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5891,7 +5931,7 @@ ] }, { - "uuid": "65a3669c-594a-436d-8fa7-a22d3586439c", + "uuid": "a538652e-c6af-47ee-9349-9b1d2b931e51", "control-id": "cis_fedora_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -5908,7 +5948,7 @@ ] }, { - "uuid": "a9294580-8496-4372-8540-d59fde271ef2", + "uuid": "efb08232-d9b1-49d4-bc77-308bc6312d1d", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5925,7 +5965,7 @@ ] }, { - "uuid": "b3c40d7d-f58a-4c6d-869d-4a75b71283bc", + "uuid": "c20fdeaa-e5df-44a9-8e59-f1a8afb8b925", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -5952,7 +5992,7 @@ ] }, { - "uuid": "de4e0694-cbf1-444f-8690-b1ff8af5ce70", + "uuid": "95e25e12-c37d-4c7f-893f-4f71087a9007", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -5969,7 +6009,7 @@ ] }, { - "uuid": "d27d9126-9067-4963-82be-1e6a848d6fba", + "uuid": "06309afb-a27c-45b0-b722-b73bf833e0bc", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -5986,7 +6026,7 @@ ] }, { - "uuid": "80fbd354-f2b9-4125-b641-fe19681e13b1", + "uuid": "ae6c2835-0177-4091-a724-cec957df7733", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -6003,7 +6043,7 @@ ] }, { - "uuid": "74fea43d-7093-4946-b5fe-fe7a3258c18a", + "uuid": "c28c1bf8-8fe2-44f1-a0f4-d04c4342340d", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -6020,7 +6060,7 @@ ] }, { - "uuid": "2eb8241b-e59e-4c3b-8130-8aed25bff7f2", + "uuid": "a48a2197-d2d9-48e5-8a23-867c02326229", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -6037,7 +6077,7 @@ ] }, { - "uuid": "562a1817-3939-42ad-9d3e-03dd2cc65ed1", + "uuid": "70fbba81-2ef2-4760-a64b-3c4d26f18048", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -6054,7 +6094,7 @@ ] }, { - "uuid": "6e053383-1ce4-4356-8481-75c3372a6a51", + "uuid": "12ff6f5b-61cf-408e-adea-6c3194e58b31", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -6071,7 +6111,7 @@ ] }, { - "uuid": "4d204bd1-9b73-45f5-a15e-939a4156e93c", + "uuid": "afacc5d6-c3fc-48e6-ae56-6206bbace5d3", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -6088,7 +6128,7 @@ ] }, { - "uuid": "aa7002d6-270f-4954-916c-6e7babf5dd7e", + "uuid": "34252d0d-f68f-4e9a-aea2-efeb788caf1f", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6105,7 +6145,7 @@ ] }, { - "uuid": "ff1a7d6d-1fc2-438c-88d5-04abd699c10f", + "uuid": "8a1e9cda-3576-45fe-bbce-5eec391e651c", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6122,7 +6162,7 @@ ] }, { - "uuid": "9f1d7128-6f31-478a-a8aa-aea632454deb", + "uuid": "ddc51b8f-320d-4dc2-9174-3f1cdf661c62", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6139,7 +6179,7 @@ ] }, { - "uuid": "478b4dea-05ec-49a8-962a-0d880b550172", + "uuid": "cee26313-e232-4be1-ba59-635e6ab79a88", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6156,7 +6196,7 @@ ] }, { - "uuid": "e3dc6053-d36f-4844-99fc-535925dd9cf0", + "uuid": "e162325b-f25a-4960-b89e-d92d6b213b79", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6173,7 +6213,7 @@ ] }, { - "uuid": "9680c82d-f62c-4e31-8ad1-462149fa3172", + "uuid": "d7d0616e-4934-4d7b-a2e4-e511d3bd853f", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6190,7 +6230,7 @@ ] }, { - "uuid": "b5370af1-2858-435e-bada-df0fc1cc772c", + "uuid": "2dc5a09d-6f5e-48da-a483-c3dbc0a4b560", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6207,7 +6247,7 @@ ] }, { - "uuid": "9d0a0165-57ba-4ae2-a777-6bb954062a88", + "uuid": "14df032b-c879-4ef8-a41a-2730ea28e330", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6224,7 +6264,7 @@ ] }, { - "uuid": "4616e4a5-6697-4d98-bb1a-31f1c6aa3d6b", + "uuid": "340940c4-01c4-4ab2-97aa-40cf79dabdd7", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6241,7 +6281,7 @@ ] }, { - "uuid": "19c142d5-2538-49fe-8e22-c60be41bed62", + "uuid": "6761525e-5a2e-4c36-bea5-74db59b5af82", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6268,7 +6308,7 @@ ] }, { - "uuid": "c269d43e-ee8a-48f4-a42a-c8f91ab7af57", + "uuid": "aaebe0ec-7c26-4ef5-a8d8-154ef9add5c9", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6295,7 +6335,7 @@ ] }, { - "uuid": "77568ce0-6121-4378-8a89-d8e3f7d490f8", + "uuid": "59295044-de54-40b0-915a-c65fc82f4299", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6322,7 +6362,7 @@ ] }, { - "uuid": "51b28e9d-32a8-4ea4-9950-1f1d4c966b53", + "uuid": "31b31c5f-1df2-4b3f-bdcd-47a27077c177", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6344,7 +6384,7 @@ ] }, { - "uuid": "04ddc4b8-0224-4d5b-b6d3-7f1743505058", + "uuid": "9ac17bc4-7970-460b-9923-cde2ac3c7c22", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -6361,7 +6401,7 @@ ] }, { - "uuid": "c22a301c-149b-402e-8a29-2a65456b8ab9", + "uuid": "cdf9a705-cae3-4490-95f3-92928208b0f4", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6393,7 +6433,7 @@ ] }, { - "uuid": "dcce59b3-dc5a-4f7d-b10e-0c49df7c2bef", + "uuid": "c5567780-2bfb-4bdd-aeff-5d43bf5b415b", "control-id": "cis_fedora_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -6415,7 +6455,7 @@ ] }, { - "uuid": "e44fdd7e-5f14-47d5-9f55-167a54551a1d", + "uuid": "0408fe0e-73d7-4e35-9c2e-db9e243ec91c", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6432,7 +6472,7 @@ ] }, { - "uuid": "21a02477-9654-4a0f-b71a-f6fa43c0a601", + "uuid": "1c5fa1cf-68b0-4538-b58c-f0ebedfd3701", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -6445,7 +6485,7 @@ ] }, { - "uuid": "94117c87-ef28-4539-a3ad-8f80fd8c4618", + "uuid": "803eb710-8104-4122-8497-9b11d7f4a91a", "control-id": "cis_fedora_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -6462,7 +6502,7 @@ ] }, { - "uuid": "32a84d21-1bac-457c-bef1-3df051dc9e26", + "uuid": "bfde9d87-2bb3-4a77-a11f-8fc395baab79", "control-id": "cis_fedora_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -6479,7 +6519,7 @@ ] }, { - "uuid": "8783380a-2177-46b8-a763-759f51000b4c", + "uuid": "7b3f9b78-e66d-441f-8eb1-81195e95bf2b", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6496,7 +6536,7 @@ ] }, { - "uuid": "b15d9de2-2667-4b4e-84b1-f80e17b70239", + "uuid": "e498abad-6864-4358-98c9-7dea84220095", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6513,7 +6553,7 @@ ] }, { - "uuid": "fe4d397f-b968-4dbc-abdf-96d344ce376f", + "uuid": "4ea1d355-de7d-4d37-9016-0487e9c1dc14", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6530,7 +6570,7 @@ ] }, { - "uuid": "7c452355-38df-4ac2-9477-a8742812293c", + "uuid": "04553cb6-d582-4ea0-82ee-6db2c50b73ac", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6547,7 +6587,7 @@ ] }, { - "uuid": "d8672b11-eb04-4aa6-aa5a-df12f5c3f203", + "uuid": "4bb19b47-a256-464e-9393-6646004970b4", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6569,7 +6609,7 @@ ] }, { - "uuid": "4c17af8e-5dca-4a92-9ec7-461ac58f19a3", + "uuid": "eca1a0c0-1ded-4dcd-ba47-8a8de05b297b", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6586,7 +6626,7 @@ ] }, { - "uuid": "529cfc37-3dd0-4de4-8594-af049a4e1c30", + "uuid": "29db7590-9c72-49c6-87f5-af017061a7bb", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -6598,7 +6638,7 @@ ] }, { - "uuid": "ba7eab1a-cae2-4355-8025-a9ea7bb75cb1", + "uuid": "bd87ab72-acb0-4329-bb82-206b3af127aa", "control-id": "cis_fedora_2-1.11", "description": "No notes for control-id 2.1.11.", "props": [ @@ -6615,7 +6655,7 @@ ] }, { - "uuid": "70d7268d-4b88-4115-8d5c-923b8789dcca", + "uuid": "5306e87b-7420-4127-9f9e-9def08fac390", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6632,7 +6672,7 @@ ] }, { - "uuid": "83c6609d-2477-4f63-adc6-66755495d1e0", + "uuid": "8ae0e959-73c8-405b-b7f1-4454d37d139c", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6649,7 +6689,7 @@ ] }, { - "uuid": "aa308fce-c9c0-43df-a227-5a7ffd284d09", + "uuid": "392d917d-2c83-4603-ad93-cd063b405fbd", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6666,7 +6706,7 @@ ] }, { - "uuid": "15f09791-a443-4a5e-92ac-8b64d696941e", + "uuid": "dd6dc6d0-25af-4c7c-b76e-a02c0ff07db2", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6683,7 +6723,7 @@ ] }, { - "uuid": "1cc045bf-9ba8-4cec-82bf-9a70ec50cc8b", + "uuid": "90675f6b-cf80-4e06-aba9-8394a0a1127d", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6700,7 +6740,7 @@ ] }, { - "uuid": "ee29f1b2-fd56-4aff-ae6b-b4da40a6e7a6", + "uuid": "0a9f86d4-1765-4756-b393-40f8a96bd5a6", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6717,7 +6757,7 @@ ] }, { - "uuid": "a87e8295-9483-4031-a9a8-1f640a26f20e", + "uuid": "a5caf6b6-370d-420c-93c8-455c18828c25", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6734,7 +6774,7 @@ ] }, { - "uuid": "4418bf50-7c17-4386-af85-c65a73ef5545", + "uuid": "5fd8df86-e344-450c-b2cc-451ba039c57c", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -6756,7 +6796,7 @@ ] }, { - "uuid": "d946aa5e-92cb-4e8b-8fac-9a7777397fdf", + "uuid": "f0512c1a-29f0-419a-b848-c46482707c5c", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -6769,7 +6809,7 @@ ] }, { - "uuid": "a5cdce6e-4cc9-4957-9752-ca613b5576e3", + "uuid": "4d90b785-1f34-4ad3-9ece-bef44bfaba2e", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -6791,7 +6831,7 @@ ] }, { - "uuid": "d4d7f4d4-4e46-468d-b1ab-15ad5990bb91", + "uuid": "9a762385-e658-4f51-8bb0-98eef8282d81", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -6804,7 +6844,7 @@ ] }, { - "uuid": "77011d84-d877-4deb-8abc-3a347a3e78ce", + "uuid": "1279d915-5a88-40a4-847d-06661346f364", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6821,7 +6861,7 @@ ] }, { - "uuid": "2d678e16-4fc7-4500-94af-afc111ff6b26", + "uuid": "194763b0-226c-43f9-8248-989ab8046705", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6833,7 +6873,7 @@ ] }, { - "uuid": "af1c8761-4a98-4a1d-a770-0e405f9481f8", + "uuid": "80299429-aa2a-4b72-937f-2f065a1ba2fa", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6850,7 +6890,7 @@ ] }, { - "uuid": "7c82d3c7-d680-49c9-9226-b10df4cb399a", + "uuid": "8d049522-cb7f-414d-9cfc-e7e1ff593d67", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -6867,7 +6907,7 @@ ] }, { - "uuid": "f4f1a03f-1309-4ca4-8066-97e721463cea", + "uuid": "79998730-36c5-41b2-8d62-53de3af72f26", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6879,7 +6919,7 @@ ] }, { - "uuid": "bf14e952-e8fe-4db7-a8db-55c4bc07b80f", + "uuid": "3331a102-e7bc-48bd-8aa8-2dd68dd14dd5", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6896,7 +6936,7 @@ ] }, { - "uuid": "076e4022-5526-47e5-9f3f-54b61e7e990a", + "uuid": "231b1773-003e-413e-8bea-bdceff6e82de", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6913,7 +6953,7 @@ ] }, { - "uuid": "ff34c9fc-c714-49b3-b304-42c00810392e", + "uuid": "cec95f68-2c72-47e5-b449-645355cc55df", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6935,7 +6975,7 @@ ] }, { - "uuid": "79abb086-5f3f-43b0-abb3-679b1552ed29", + "uuid": "4415eb4d-20d4-4a4f-9ca1-8ca933b21385", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6962,7 +7002,7 @@ ] }, { - "uuid": "a65078b4-3e09-422e-b7e0-5dbd894bc4fa", + "uuid": "cc3df4d3-4d04-4534-a0e8-5adbd13875e3", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6989,7 +7029,7 @@ ] }, { - "uuid": "37d7b235-9869-4244-b73c-06ed01b4dd96", + "uuid": "028d22e0-d074-4f72-9e0e-b380c1eb7e3e", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -7016,7 +7056,7 @@ ] }, { - "uuid": "b6c05413-5930-4a4e-aefe-5a70c4eaf65f", + "uuid": "b19716b9-27e5-4457-9896-c057f16a16f1", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -7043,7 +7083,7 @@ ] }, { - "uuid": "6eca29b3-7a45-4c22-bee8-44106999d173", + "uuid": "665a27ff-730f-45c0-98a6-3f4d14162af9", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -7070,7 +7110,7 @@ ] }, { - "uuid": "441bdb4d-d94a-46bc-bb4d-ae70b535d0cb", + "uuid": "805c7fac-65a8-4b67-9c98-34adf26d2f35", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -7097,7 +7137,7 @@ ] }, { - "uuid": "2f7a568b-1a8e-43c8-826c-b7415169eb34", + "uuid": "4050bac6-57a9-4209-b60e-4253e851f834", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -7124,7 +7164,7 @@ ] }, { - "uuid": "00c3d4a4-7263-431a-9608-c1db7846b815", + "uuid": "6df2c4fb-ad82-4bb7-bab6-7b4a77b7ab91", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -7161,7 +7201,7 @@ ] }, { - "uuid": "e0741f38-0b91-4ca4-96d9-b1ca69baad61", + "uuid": "a09decee-6e44-4dec-b852-70e13d313456", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -7198,7 +7238,7 @@ ] }, { - "uuid": "7a1edffd-5fc6-4787-8d8b-4bbe99008e2d", + "uuid": "9b3a7554-edc2-4eda-b05c-181f526f1234", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -7211,7 +7251,7 @@ ] }, { - "uuid": "bd449dcc-817e-4a0c-ae07-9047ac6d59f5", + "uuid": "caa91427-1517-4f96-b641-e6fc5cc1b477", "control-id": "cis_fedora_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -7228,7 +7268,7 @@ ] }, { - "uuid": "85e6d1fc-be12-41ce-bd1a-0ef7528ef7b7", + "uuid": "0ffb8dd6-29c5-457c-8193-314b4b964575", "control-id": "cis_fedora_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7245,7 +7285,7 @@ ] }, { - "uuid": "31f49f0b-8176-415b-857d-d7ee88e4b198", + "uuid": "8fefc73f-6b3c-49f6-b223-356732ad372b", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7262,7 +7302,7 @@ ] }, { - "uuid": "fbd0e98d-3faf-4e3f-92c1-59c1a1de21f0", + "uuid": "125fb699-11bf-43c6-a7d1-6f4333a0f784", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7279,7 +7319,7 @@ ] }, { - "uuid": "2fc18cc2-4e92-4d97-b25d-e7cf9597c63f", + "uuid": "13d1a489-a16a-4e47-85af-667a278e58b0", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7296,7 +7336,7 @@ ] }, { - "uuid": "383c84e5-f981-41de-8ed3-028761f24323", + "uuid": "59f22623-8583-43ba-ad54-18d18bd6c27b", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7313,7 +7353,7 @@ ] }, { - "uuid": "102edfc2-56ff-456c-9d9a-1f8d6202369c", + "uuid": "c19381c3-d662-4a42-97c3-692a2a7aa6fd", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7330,7 +7370,7 @@ ] }, { - "uuid": "36882af0-e86a-489d-b6cb-4745a7c17ce2", + "uuid": "df1340ad-d75c-49bb-9b3c-fb1468039ed6", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7347,7 +7387,7 @@ ] }, { - "uuid": "669433c5-aab1-44c8-81b2-a854d2a0c5c0", + "uuid": "07df004b-a7ac-4a32-a5a1-fd5a4d511b25", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7364,7 +7404,7 @@ ] }, { - "uuid": "a838b830-b76e-44cc-ae0d-4d37fc697ddf", + "uuid": "12a15696-f8a0-4ba4-92ad-333c9800793c", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7381,7 +7421,7 @@ ] }, { - "uuid": "3192b669-7c8c-4acc-80f3-64d0fc8ef6eb", + "uuid": "a2c83a3b-2748-4358-b166-934c6aaeaa4f", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7398,7 +7438,7 @@ ] }, { - "uuid": "f65ec343-411d-42fe-a4fd-37b2e2b978a5", + "uuid": "e3aabcd6-35f3-45a7-a454-e15f4d4c8e61", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7415,7 +7455,7 @@ ] }, { - "uuid": "313c60e9-34b8-4ef2-b768-73f40b4ffa57", + "uuid": "4d31d7be-f5ac-457d-afd2-7c421f04b3c0", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7432,7 +7472,7 @@ ] }, { - "uuid": "e9edbf77-1c0b-4741-95be-d0b32913296d", + "uuid": "dd5ae13c-93e2-4501-9588-91714bf5de61", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7449,7 +7489,7 @@ ] }, { - "uuid": "ead23d83-7d93-4949-903c-a0d3a39b03b4", + "uuid": "744a229e-1192-4f24-aaa9-1ae8063f6772", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7466,7 +7506,7 @@ ] }, { - "uuid": "dd026070-93ec-4fc6-a438-f23b3ec73b16", + "uuid": "b8f7d38f-7e21-451f-ad23-2e883f91cbf2", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7483,7 +7523,7 @@ ] }, { - "uuid": "c8123486-e738-4609-84d0-a988ad92abea", + "uuid": "0c00b151-4dc8-4608-a6d9-d06af8a5a13c", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7500,7 +7540,7 @@ ] }, { - "uuid": "76f2d264-fad0-45d1-9fe7-7f93f1da8915", + "uuid": "1c2e31f4-283b-407c-85bf-810b3a0c77d9", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7517,7 +7557,7 @@ ] }, { - "uuid": "e77d9411-766d-42de-88e4-43b9a1429750", + "uuid": "23ddb67d-6dd2-4721-aba0-eb0ca5c4a189", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7534,7 +7574,7 @@ ] }, { - "uuid": "4845c192-b966-40db-8f58-a4972e2b6bea", + "uuid": "c1638bc3-90df-4ab5-b99e-1fcd0410d23f", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7551,7 +7591,7 @@ ] }, { - "uuid": "9dfeeae9-281f-447a-ad83-ce69c0bafe66", + "uuid": "375a5723-1e2c-447a-a7cc-34c408cf85f2", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7568,7 +7608,7 @@ ] }, { - "uuid": "d1d0f758-e5f5-4eff-9eca-6bc9e8224081", + "uuid": "dc4175c8-cc75-4a6b-b250-f57674f525a1", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7585,7 +7625,7 @@ ] }, { - "uuid": "6a36a4cd-411b-4c2d-a0c9-9aafa609699a", + "uuid": "7b84bc6a-bcc7-4fcc-924b-141274cb837c", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7602,7 +7642,7 @@ ] }, { - "uuid": "35223004-d47f-407e-bd1b-047719355108", + "uuid": "3f68b65f-d66c-480a-ba4f-44c7ecdb6661", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7619,7 +7659,7 @@ ] }, { - "uuid": "07ae5029-629a-436d-b2ca-d932bc64340e", + "uuid": "fa0792aa-9323-4242-9c29-5c14fbcb53de", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7636,7 +7676,7 @@ ] }, { - "uuid": "fbaf4a6b-b258-432d-9541-c8f892211a04", + "uuid": "20e14822-4963-4c8e-b250-519d2d63b9b3", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7653,7 +7693,7 @@ ] }, { - "uuid": "55eafd69-a541-4206-8bf2-8f80192a6942", + "uuid": "e8da6639-5d84-4223-8a93-63b3b4efa61f", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7670,7 +7710,7 @@ ] }, { - "uuid": "a7bcc5f9-a4b1-4070-9ffe-cf3a1353eb08", + "uuid": "6c72d641-2add-411e-8fd3-180407b67dc1", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7687,7 +7727,7 @@ ] }, { - "uuid": "41a1aceb-c7c0-4e75-a771-1c4aea42e82c", + "uuid": "2e426de6-5e8a-429d-b82f-3c30da3ec3ec", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7704,7 +7744,7 @@ ] }, { - "uuid": "887d7e86-35a4-4643-b634-3dc7da2792d8", + "uuid": "29e7634d-73ac-478d-b8b0-3c98aae9e7ed", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7721,7 +7761,7 @@ ] }, { - "uuid": "d9dda0ad-45dc-4e59-b81f-a06863cc6d49", + "uuid": "721e6c0d-0cb4-4239-83fb-dbfe369c2bc5", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7738,7 +7778,7 @@ ] }, { - "uuid": "299a1d53-23b4-4ab6-8a2b-4dc0e5b8494a", + "uuid": "01cef6a5-f8ab-4ca0-9820-05235e5795ae", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7755,7 +7795,7 @@ ] }, { - "uuid": "364465e3-ec71-490a-be7f-66c25f33f44b", + "uuid": "afc9566e-072a-43c7-aee9-6bd7a2d24992", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7772,7 +7812,7 @@ ] }, { - "uuid": "bac3c40a-a25d-4ec5-b7a9-06feee47c429", + "uuid": "03854176-9aaf-4dc0-bc73-9ec977958fe3", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7799,7 +7839,7 @@ ] }, { - "uuid": "44ef0b04-3826-4b5f-aa6a-d1c264028808", + "uuid": "b8017dd2-7869-4276-8196-37b9cdc48f82", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -7812,7 +7852,7 @@ ] }, { - "uuid": "cbaeb98a-95c4-4df9-ab62-6540a99dde04", + "uuid": "e74b87da-81b7-4932-af27-82f5a9a36c17", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -7834,7 +7874,7 @@ ] }, { - "uuid": "03dfd7e3-a6ce-452c-81a0-efb0d43d7da3", + "uuid": "04ed6195-350a-4ae9-a86a-6811e8b5e35b", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -7846,7 +7886,7 @@ ] }, { - "uuid": "cf436374-4a04-4508-8afc-8074d1c13c9a", + "uuid": "ec11d046-6338-44b6-aba6-2dc37e5f4fbd", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -7859,7 +7899,7 @@ ] }, { - "uuid": "df44a796-f19d-4715-84dc-87afe751d992", + "uuid": "25947a9c-1015-442e-84aa-3c3859be40dd", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -7871,7 +7911,7 @@ ] }, { - "uuid": "9e28dea8-abc0-4458-9384-59a4583ea205", + "uuid": "ef3bdc31-db5d-4ade-92a4-88009161ed3d", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -7883,7 +7923,7 @@ ] }, { - "uuid": "f44126d9-7762-4686-8056-9881fef2e9f9", + "uuid": "0d60c66d-b04b-4812-95dc-dc0757519d60", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7940,7 +7980,7 @@ ] }, { - "uuid": "f0a61190-e606-4baf-b9b0-a6c43fbde88c", + "uuid": "e3f8af3e-f0fe-400d-a4cb-72c0a7033b30", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7967,7 +8007,7 @@ ] }, { - "uuid": "340cfa22-893f-4dbc-a47a-89df741eb36b", + "uuid": "fe247779-22f3-4372-ab4d-7b1163af974b", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7994,7 +8034,7 @@ ] }, { - "uuid": "8229bf3f-69d1-4b4c-b6fe-42509a449046", + "uuid": "ae60f631-28dd-4199-949a-5a18f980c00d", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -8011,7 +8051,7 @@ ] }, { - "uuid": "d095c915-d989-40c0-ae36-af2577d3aa9f", + "uuid": "0191c184-c259-40fc-8fa3-de59a09e0cb0", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -8028,7 +8068,7 @@ ] }, { - "uuid": "f7477ee5-a5ad-460c-9ec9-34d06ec5ac1f", + "uuid": "902a1337-d417-41af-abaf-b44bf554faca", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -8045,7 +8085,7 @@ ] }, { - "uuid": "f69441fa-ff35-4671-890f-0e39add4b5aa", + "uuid": "2a2e386a-33a4-4aaf-b8f7-6fbb60590ac4", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -8062,7 +8102,7 @@ ] }, { - "uuid": "e445417d-e3d8-47bd-8670-3f80ea821701", + "uuid": "c34f7c73-0bc8-4f4b-89bf-4b4efd3bcbbf", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -8079,7 +8119,7 @@ ] }, { - "uuid": "bac80502-8663-428d-bfbf-2d167a8686e1", + "uuid": "60e9335f-4056-4b65-83fb-81c040fbe969", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -8101,7 +8141,7 @@ ] }, { - "uuid": "1cefdefa-6bb9-4297-86d6-f4d3e6ce7701", + "uuid": "3f64d4a7-b0fe-42df-b576-f64310755ba7", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -8118,7 +8158,7 @@ ] }, { - "uuid": "31bea4fb-58f0-4f2b-99ba-4bd57f6792ab", + "uuid": "b8ca85c2-40bf-49cb-8f52-49a512856b1b", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -8135,7 +8175,7 @@ ] }, { - "uuid": "e483763e-7648-4463-bd93-a1730ff2fdb0", + "uuid": "7eb1ca9c-5b61-4d6e-9d49-b6a476c71e8a", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -8152,7 +8192,7 @@ ] }, { - "uuid": "771440b0-052b-4073-8f57-31c1edf1ef81", + "uuid": "fa1306b6-3f5f-479c-bfed-40b5ecd3d906", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -8169,7 +8209,7 @@ ] }, { - "uuid": "0cf06216-4129-4cb4-b6a7-3dd45b3faacc", + "uuid": "a9ce963a-a4da-4df5-a50e-7e2d1fa7bab5", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -8186,7 +8226,7 @@ ] }, { - "uuid": "54848a3a-b2a3-4ea4-ac14-70a8a1d06f64", + "uuid": "45b817f2-5366-44d0-b23e-113fbe3c2c7f", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8203,7 +8243,7 @@ ] }, { - "uuid": "04abc830-7076-4949-811a-826097cb2c0b", + "uuid": "37fec289-397a-420e-8fdd-8c294fd8bc5c", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8220,7 +8260,7 @@ ] }, { - "uuid": "fe4c10b6-dfb9-4338-b5f0-ae5bb64310a2", + "uuid": "b9308acf-0560-48cb-85e0-6a8b8bca1f71", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8237,7 +8277,7 @@ ] }, { - "uuid": "eaf63e0e-97ea-4597-95ea-67942ea21075", + "uuid": "e34ae26f-08e8-4186-b685-92305a56f456", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8254,7 +8294,7 @@ ] }, { - "uuid": "29e133d0-a33c-40ff-bed4-cc4c37f5aab6", + "uuid": "1db50301-d05c-4945-b21f-3156b4dd63e7", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8271,7 +8311,7 @@ ] }, { - "uuid": "930cc90e-3df5-4ab9-9fdf-c756881e6b37", + "uuid": "bc9c4839-a211-4721-b8b7-cca5acad1506", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8288,7 +8328,7 @@ ] }, { - "uuid": "c8c60e34-bf3a-485e-9c76-7bf66b583931", + "uuid": "5c770c61-e655-414a-9130-527220b1cdcd", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8305,7 +8345,7 @@ ] }, { - "uuid": "508df1cf-96f4-4dc7-86a2-1632a2963e8f", + "uuid": "4cad82c3-6a9e-406b-8aad-5df7a2cf197d", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8322,7 +8362,7 @@ ] }, { - "uuid": "a7983b79-45f7-4262-9f8d-b939597f5032", + "uuid": "1feee5c6-c10b-4fcd-a98a-8fee127c6f1f", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8339,7 +8379,7 @@ ] }, { - "uuid": "38ff8c9b-a9b9-4733-bb86-7ca515addb1e", + "uuid": "2ddefda2-0b9c-4fb5-a99c-3ee26d9483c4", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8356,7 +8396,7 @@ ] }, { - "uuid": "775041c5-fff6-4779-8d32-4e5d0005a3af", + "uuid": "cf014a49-2ea2-4b4c-bc97-8707355f35e6", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8373,7 +8413,7 @@ ] }, { - "uuid": "fccf3b7b-15bd-4c07-9987-759dfe3b9f60", + "uuid": "573c577b-3c85-47da-905f-754b0201216f", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8395,7 +8435,7 @@ ] }, { - "uuid": "6cc8cffa-9739-4729-a0bb-d9c41ed59c5b", + "uuid": "80f3d888-9756-403d-99ea-045fa0f5ea24", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -8408,7 +8448,7 @@ ] }, { - "uuid": "cac3fce2-d2d3-4365-8021-03670f9f1f37", + "uuid": "7e06147c-038f-496b-8393-fda509fe19f9", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -8421,7 +8461,7 @@ ] }, { - "uuid": "195306f4-7c56-4278-9e71-a2a82ab52867", + "uuid": "ea6bfff7-0d67-41b8-917b-a2ab5c3e84f4", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -8439,7 +8479,7 @@ ] }, { - "uuid": "dc48a36a-fed1-4449-97b0-a8b743dcb71b", + "uuid": "5332ee03-5ea1-4adb-95e3-f9a483b1aa1b", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -8456,7 +8496,7 @@ ] }, { - "uuid": "9089b6ad-3702-41eb-89ba-c17c847631c6", + "uuid": "3a7a3deb-1275-4f7f-acea-50371e580ca0", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -8478,7 +8518,7 @@ ] }, { - "uuid": "2ef0fdba-ccb0-43d2-9988-c7e1b1ff9758", + "uuid": "ee3dd770-a006-4ef0-8b2a-4b6e47c7912f", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -8505,7 +8545,7 @@ ] }, { - "uuid": "79e1479e-8ee1-4892-851c-75b066316104", + "uuid": "978c5c77-4239-4844-82d1-d7380cd2beae", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -8517,7 +8557,7 @@ ] }, { - "uuid": "a14448de-7fc4-467a-a742-52dd22555fc6", + "uuid": "e8efaf4d-718e-4831-a64d-787af07088ce", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -8534,7 +8574,7 @@ ] }, { - "uuid": "87487c46-8432-4143-8502-aa7df09afbb9", + "uuid": "bf9e886a-1245-4a56-8322-6338ab4831b2", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -8551,7 +8591,7 @@ ] }, { - "uuid": "b0f6f663-b340-4d96-8f1c-978122c57b94", + "uuid": "ceeb3719-c34b-4707-90c0-ef9a0139386b", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8568,7 +8608,7 @@ ] }, { - "uuid": "2fdd36e3-0ccb-4a3a-a8d0-2727cd727d0f", + "uuid": "ce3fa192-b776-4da0-87ad-016f95e2739b", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -8585,7 +8625,7 @@ ] }, { - "uuid": "7ddaf9a3-be1c-4b4e-b624-ecb1778d3aa0", + "uuid": "50edd7d3-c4ef-4f06-a643-ed7ab7107def", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -8602,7 +8642,7 @@ ] }, { - "uuid": "0fbeb8da-f7f2-4e1d-afab-8233b1dbcd63", + "uuid": "b7c67e86-a355-400f-a747-8aa5b7f60f3c", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -8619,7 +8659,7 @@ ] }, { - "uuid": "d5948015-c684-4119-a3e1-f382b091f884", + "uuid": "3bf2e452-f5ed-495c-92e1-928f24919832", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -8636,7 +8676,7 @@ ] }, { - "uuid": "b4310198-3d9b-4a45-bc7c-7989a90fc336", + "uuid": "1617b5e4-bad5-4257-96ec-fe68da39c401", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -8653,7 +8693,7 @@ ] }, { - "uuid": "90bc8a22-0bba-4eb7-9099-86d601de74d7", + "uuid": "57cec517-32e5-4f0f-900d-2775088124d1", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -8670,7 +8710,7 @@ ] }, { - "uuid": "de9383c8-188e-4c2a-879f-695d6a8c5d26", + "uuid": "68dfcd07-7ad9-4d01-95f6-670f0e669a0e", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -8687,7 +8727,7 @@ ] }, { - "uuid": "3a66b841-dab8-4ed3-bd6d-0a076fe59ddb", + "uuid": "d10e66ec-00a4-47a9-a814-e3b9cda7a84a", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8709,7 +8749,7 @@ ] }, { - "uuid": "f6228dc1-fa4c-41b0-912a-c5bf2bb98a15", + "uuid": "9823232f-0ad9-496d-8895-96b353f0d059", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -8722,7 +8762,7 @@ ] }, { - "uuid": "45185b33-bae2-4a47-8db7-38f1cb479359", + "uuid": "c8253f03-e51c-468a-bc26-1c139cdd4a0f", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8739,7 +8779,7 @@ ] }, { - "uuid": "9c6ca166-248f-4872-b457-3f660b50d003", + "uuid": "89a58f37-f189-491d-b309-7230cde068d9", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -8756,7 +8796,7 @@ ] }, { - "uuid": "e79527ea-8357-44eb-97ac-1854b61e0b36", + "uuid": "dc72eab8-f2ce-498a-ae73-f9efb986d8ec", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8773,7 +8813,7 @@ ] }, { - "uuid": "644ea33b-94f1-4cee-9a0d-2a295e933a33", + "uuid": "e3163c26-377b-44f4-ada9-921dd29d0a46", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8795,7 +8835,7 @@ ] }, { - "uuid": "8673ac29-d544-49b2-abaf-e51549c995bf", + "uuid": "2b1f5018-7269-48a4-ada8-fd12ae0e1338", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -8812,7 +8852,7 @@ ] }, { - "uuid": "4065d983-6700-4531-a137-1af7c422251f", + "uuid": "fbc791ec-fee1-44c8-99bc-30d3cc977493", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8834,7 +8874,7 @@ ] }, { - "uuid": "b83741ea-1034-4342-a777-3b496d99de2c", + "uuid": "4b4dc849-66ee-4aed-8861-3a879757ebf9", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8856,7 +8896,7 @@ ] }, { - "uuid": "41facd1a-452e-412b-acd8-b5a598edb929", + "uuid": "fd0587ea-3f8c-4c4c-b9a4-83192c3c63c2", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -8873,7 +8913,7 @@ ] }, { - "uuid": "08d56730-6d12-4676-913d-449314928651", + "uuid": "16489c41-fee3-459f-b5c1-b45014e5f193", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8895,7 +8935,7 @@ ] }, { - "uuid": "392c2fb5-73a6-47c4-bf46-2f60c168e3e2", + "uuid": "fa75e39e-c8c9-4c9e-8ad9-79db592eedfb", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8912,7 +8952,7 @@ ] }, { - "uuid": "c2e306dc-32ac-4270-a9e1-5d28440e67ad", + "uuid": "b9c9cf71-0f72-4fb5-b291-238c05990c66", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8929,7 +8969,7 @@ ] }, { - "uuid": "4f72e4be-95e8-4846-8aab-6493ea34695b", + "uuid": "0dfc4bb0-becc-4953-9c3e-5e80ea5da7ac", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8946,7 +8986,7 @@ ] }, { - "uuid": "f41938c5-4f82-41c3-a772-dd400890eb54", + "uuid": "e649ef8e-7a69-4b3c-877c-122493442d6d", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8963,7 +9003,7 @@ ] }, { - "uuid": "30532e69-67ef-4089-8e11-1954e3ebb5aa", + "uuid": "1d07d4e4-f90f-4a54-8ed2-0fe2b8a8f58b", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8980,7 +9020,7 @@ ] }, { - "uuid": "0d558c21-3a25-4287-886e-1f61106ddf5d", + "uuid": "8bdb715c-ccf1-4472-837b-bd8e22b795c3", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -9002,7 +9042,7 @@ ] }, { - "uuid": "4903ceaf-1215-48fd-bd3c-33cf0d51ee81", + "uuid": "2cb3249a-7ad1-43e5-8ce4-18496d59a96b", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -9019,7 +9059,7 @@ ] }, { - "uuid": "9e9713b2-409f-4368-9e44-517c4e65d9ab", + "uuid": "868d077b-8fda-46ad-b86a-0e883c4d0f90", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -9041,7 +9081,7 @@ ] }, { - "uuid": "9f1398b4-b2f6-4e2c-bfbb-df1aa5cdd711", + "uuid": "50369bf0-737d-417e-8058-7f4827012640", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -9058,7 +9098,7 @@ ] }, { - "uuid": "7f098e0a-5e5e-456e-8eef-dbce1a65b768", + "uuid": "c24b490f-1fd5-42d6-9d78-dcccf8799e35", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -9075,7 +9115,7 @@ ] }, { - "uuid": "20361204-abb1-4451-9cfc-56ab09b40f42", + "uuid": "c800178a-220a-4665-945c-12f4c1df136f", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -9102,7 +9142,7 @@ ] }, { - "uuid": "5d77b389-9a0a-4b93-9440-3f312898d491", + "uuid": "edce95e8-57b8-4034-bd58-a78da86c5ee3", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -9124,7 +9164,7 @@ ] }, { - "uuid": "3d2881e9-d6ff-47db-95ef-dde51f482ce2", + "uuid": "36a5deab-4656-4b46-a866-0bbc45830cdb", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -9141,7 +9181,7 @@ ] }, { - "uuid": "495a02bf-b85d-421e-b06d-e45b1b41ebb8", + "uuid": "24d59d05-1164-4dc9-8a19-62e213f60e1e", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -9158,7 +9198,7 @@ ] }, { - "uuid": "283a9f5f-47fe-4689-9ba8-81430ba008b2", + "uuid": "5cc59d11-7f36-45cd-b4f4-d46c38139bee", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -9175,7 +9215,7 @@ ] }, { - "uuid": "08013dde-b7ee-4c9f-8a90-9b31624b31ab", + "uuid": "bc859ae1-2155-4b36-bf24-f73c4ed51589", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -9188,7 +9228,7 @@ ] }, { - "uuid": "e3889ce8-d185-4750-a76f-72b10a0eb314", + "uuid": "3d66d2b1-32a7-4b23-8100-837a10579657", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -9201,7 +9241,7 @@ ] }, { - "uuid": "8b9b5cdc-9dec-477a-ab2a-edfa64df6f94", + "uuid": "03d55231-d7f5-462c-aa7d-3f1f9cfba947", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -9218,7 +9258,7 @@ ] }, { - "uuid": "aa865093-dd99-48ef-9cf2-62d1db3fe4a3", + "uuid": "9d4020a6-fda3-47cb-a19e-c522542f1517", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9235,7 +9275,7 @@ ] }, { - "uuid": "c278fb79-f3f3-4f7a-bc9d-2db563e2c3ca", + "uuid": "53b3ecee-f4bc-4889-8220-1bcc1804416a", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -9248,7 +9288,7 @@ ] }, { - "uuid": "2e94867c-c09f-4725-9299-12fb97c9357c", + "uuid": "f0e689d3-eecd-40ff-91a9-bd625031a5c1", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9265,7 +9305,7 @@ ] }, { - "uuid": "2663c5dd-635f-43b4-849c-ae249e5a339f", + "uuid": "5c2084f5-2815-4e6e-b4b2-23e3d5e77c19", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9282,7 +9322,7 @@ ] }, { - "uuid": "6b7d87b6-51d1-4738-a84f-d992818681d2", + "uuid": "fa58cace-6162-4f52-b1fd-6d0ae34085ad", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9299,7 +9339,7 @@ ] }, { - "uuid": "a9536c3a-b901-470a-9b16-3fca432d38d2", + "uuid": "00d67a3a-0a97-4a69-bb49-8e4077c6d240", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9316,7 +9356,7 @@ ] }, { - "uuid": "9b8388dc-02b9-42cd-8b75-e1fb586a1af0", + "uuid": "84766711-cd8e-4bad-82f0-4d6da857a402", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9333,7 +9373,7 @@ ] }, { - "uuid": "04f9dc35-5d39-4105-a69f-6b6fe0991390", + "uuid": "7fedd951-3265-41df-8305-b0b1f4687304", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -9345,7 +9385,7 @@ ] }, { - "uuid": "f611ca10-dd5a-483e-839c-76b67880f335", + "uuid": "580242d2-4827-4e66-8d47-6d89ed97c06a", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -9357,7 +9397,7 @@ ] }, { - "uuid": "e8a1f194-5104-44d8-99cd-de19830e7496", + "uuid": "100d5949-b7a3-44bf-a4f7-642e3184156e", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -9369,7 +9409,7 @@ ] }, { - "uuid": "4bfc3c85-576c-4d15-9fe2-cd107e7d476d", + "uuid": "c4d71ad1-fea4-4cf8-b257-5fe63191f3e6", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -9381,7 +9421,7 @@ ] }, { - "uuid": "bd7814e6-64fa-4404-9201-903be325aff6", + "uuid": "a66cf12f-7a93-4842-991d-6a89b76e38ea", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -9394,7 +9434,7 @@ ] }, { - "uuid": "71e743a7-14ba-4193-bc36-107bda9769fc", + "uuid": "fd26a0e7-ba6e-490f-9729-7f5bb21fac2f", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -9407,7 +9447,7 @@ ] }, { - "uuid": "7b3eb75d-00db-4a51-9e66-f7c5b797e77d", + "uuid": "c76860e4-b547-4c5e-bc46-5600fceaeeaf", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -9419,7 +9459,7 @@ ] }, { - "uuid": "54eecaec-6af9-4543-8950-a2fed7ca3612", + "uuid": "fcb51d70-ea50-4864-ae7e-2e85894fe168", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -9432,7 +9472,7 @@ ] }, { - "uuid": "d6657a04-f6c9-45aa-a5fa-430f1dbd6243", + "uuid": "e02ab9af-3f5b-47e6-9abc-09395aaa75fa", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9459,7 +9499,7 @@ ] }, { - "uuid": "bd60f444-dbbf-4b38-981e-b3d91dd1de90", + "uuid": "c352149b-324b-4426-b003-83e7af0d0c6f", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9486,7 +9526,7 @@ ] }, { - "uuid": "03f78ad6-b3a4-4bfd-bafc-884d6f768ea6", + "uuid": "f453809f-bae2-4054-b454-cb2fce0c0a44", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9513,7 +9553,7 @@ ] }, { - "uuid": "eec289ea-b4a6-402d-ae6c-6e991e4dadff", + "uuid": "d62690b3-6c2c-4b55-af3c-b8ad7f0c9d3d", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9540,7 +9580,7 @@ ] }, { - "uuid": "65477fb2-5205-414a-9c25-a1220a1e60a3", + "uuid": "d72cfe5d-4622-4e2e-9fa9-78c26be22ee8", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9567,7 +9607,7 @@ ] }, { - "uuid": "a3220444-4edc-412f-8f95-4b2283851923", + "uuid": "265e4a89-f4b0-4e2b-9c83-b766726e61b4", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9594,7 +9634,7 @@ ] }, { - "uuid": "f2b6a18c-a0cf-46f0-be77-1cc9af79826e", + "uuid": "96d07d97-cdc0-4a00-96cf-43ed72a84f26", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9621,7 +9661,7 @@ ] }, { - "uuid": "bd8937d8-6bd8-40a0-a0b4-3adf026b9db8", + "uuid": "9858f285-9e47-4cac-97ac-0945cb308498", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9648,7 +9688,7 @@ ] }, { - "uuid": "ab6803be-bb8a-450b-b34f-3e87f034c0b9", + "uuid": "3501a8b7-2e0d-48b0-923f-55abc46574d8", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9675,7 +9715,7 @@ ] }, { - "uuid": "56641294-97ac-4fdb-8f37-2e17090e29d8", + "uuid": "26091a4a-c44a-4366-bf29-67f5de2ac5e5", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9702,7 +9742,7 @@ ] }, { - "uuid": "0235567a-f125-46a0-a276-071852376f70", + "uuid": "28aff5f3-506b-4daa-be3e-5e02341cc760", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9744,7 +9784,7 @@ ] }, { - "uuid": "ad67fc90-f5c1-47f1-8d2f-33e63de2c00c", + "uuid": "eef28779-4f1c-45ee-9f40-453d0e26653e", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9766,7 +9806,7 @@ ] }, { - "uuid": "0a38a049-4b38-4cb8-9899-df41574acf4c", + "uuid": "5c06592d-e3df-4bd7-b777-8a5e84593b03", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9788,7 +9828,7 @@ ] }, { - "uuid": "3ee4c8f7-1049-44f4-b5b8-17c2e40a8494", + "uuid": "a4344d05-4cde-49e9-b175-9c3d20672174", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -9801,7 +9841,7 @@ ] }, { - "uuid": "96cd91e9-a601-42e0-afd3-b52f4e6a41eb", + "uuid": "3a3f8772-427f-4408-9116-df27c9b4a55a", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9818,7 +9858,7 @@ ] }, { - "uuid": "0cf788c1-01ee-4046-ba44-5d0b78575cf9", + "uuid": "c15f882d-90de-4ec7-ad14-c187200b8075", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9835,7 +9875,7 @@ ] }, { - "uuid": "16918b1b-0a38-40cc-891f-846491e042f9", + "uuid": "0059d888-3b55-404e-b0de-428515a6bc17", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9852,7 +9892,7 @@ ] }, { - "uuid": "f8fd129f-8c36-43b5-b060-23a84f6fa7fc", + "uuid": "a1366758-3b65-4dc9-bdcc-4432d238f9d6", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9869,7 +9909,7 @@ ] }, { - "uuid": "d0621ca9-a190-48db-95f3-ed2e44d2edd9", + "uuid": "d046ac40-379e-41e3-a490-c7792fd7b96a", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9886,7 +9926,7 @@ ] }, { - "uuid": "129bbdb4-a0e8-49c3-a2e2-24db42a60b7d", + "uuid": "bfb16177-5d48-448c-88c8-890bd2d91d3c", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9903,7 +9943,7 @@ ] }, { - "uuid": "322d7980-f459-45d5-83db-06ea14c118cb", + "uuid": "6b72d415-0dac-4ad4-9a6f-4fd5c7d82b28", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9920,7 +9960,7 @@ ] }, { - "uuid": "8f13905a-9119-48af-bee8-363cac322bf0", + "uuid": "896ca79e-0923-43f4-9066-cc1a812e2f91", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9947,7 +9987,7 @@ ] }, { - "uuid": "a3eb2bb1-1f8e-40cb-b881-59ff6b0065ee", + "uuid": "eb9d22b7-bb71-4258-a7b3-a9f17b358aff", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -10048,103 +10088,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -10156,67 +10196,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -10228,13 +10268,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -10246,13 +10286,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -10264,31 +10304,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -10300,49 +10340,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -10354,13 +10394,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -10372,31 +10412,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -10408,13 +10448,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -10426,13 +10466,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -10444,13 +10484,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -10462,13 +10502,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -10478,541 +10518,559 @@ "remarks": "rule_set_000" }, { - "name": "Parameter_Id_25", + "name": "Parameter_Id_25", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_25", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Toggle ICMP Redirect Acceptance By Default", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_25", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_25", + "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_25", + "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_26", + "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_26", + "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_26", + "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_27", + "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_27", + "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_27", + "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_28", + "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_28", + "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_28", + "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_29", + "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_29", + "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_29", + "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_30", + "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_30", + "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_30", + "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_31", + "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_31", + "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_31", + "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_32", + "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_32", + "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_32", + "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_33", + "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_33", + "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enter default user umask", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_33", + "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_34", + "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_34", + "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_34", + "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_35", + "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_35", + "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_35", + "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_36", + "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_36", + "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_36", + "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_37", + "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_37", + "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_37", + "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_38", + "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_38", + "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_38", + "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_39", + "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_39", + "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_39", + "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_40", + "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_40", + "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_40", + "name": "Parameter_Value_Alternatives_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_41", + "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_41", + "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_41", + "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_42", + "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_42", + "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_42", + "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_43", + "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_43", + "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_43", + "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_44", + "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_44", + "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_44", + "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_45", + "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_45", + "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_45", + "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_46", + "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_46", + "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_46", + "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_47", + "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_47", + "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_47", + "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_48", + "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_48", + "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_48", + "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_49", + "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_49", + "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_49", + "name": "Parameter_Value_Alternatives_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_50", + "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_50", + "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_50", + "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_51", + "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_51", + "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_51", + "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_52", + "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_52", + "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_52", + "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_53", + "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_53", + "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_53", + "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_54", + "name": "Parameter_Id_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_user_initialization_files_regex", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_54", + "name": "Parameter_Description_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_54", + "name": "Parameter_Value_Alternatives_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" @@ -11692,7063 +11750,7087 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "disable_weak_deps", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "disable_weak_deps", "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_setroubleshoot_removed", + "value": "package_mcstrans_removed", + "remarks": "rule_set_036" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Uninstall mcstrans Package", + "remarks": "rule_set_036" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_mcstrans_removed", + "remarks": "rule_set_036" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_036" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_setroubleshoot_removed", + "remarks": "rule_set_037" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot Package", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot_removed", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot Package", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_boot_grub2", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must have mode 0600 or more restrictive", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_boot_grub2", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must have mode 0600 or more restrictive", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_boot_grub2", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be owned by root", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_boot_grub2", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be owned by root", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_boot_grub2", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be group-owned by root", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_boot_grub2", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be group-owned by root", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_323" } ], "control-implementations": [ { - "uuid": "d5742631-47d8-47a3-88fc-766fc4fb50e5", + "uuid": "ba6f7fbd-4ec7-4dfb-ba63-f40ba2fc3690", "source": "trestle://profiles/fedora-cis_fedora-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -18766,17 +18848,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -19092,7 +19180,7 @@ ], "implemented-requirements": [ { - "uuid": "0a31c879-fbf5-4048-83fd-df6f42594a11", + "uuid": "d9b58761-23c8-4073-8f22-e4f964146287", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -19109,7 +19197,7 @@ ] }, { - "uuid": "f43ed32e-4a4f-48be-82eb-45ced89fb3aa", + "uuid": "8da30100-9ed0-4b23-8837-1308ff971f21", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -19126,7 +19214,7 @@ ] }, { - "uuid": "205f8fbd-ba97-42e6-8ddf-88c54a19ddfa", + "uuid": "6f72f549-f8bb-4c58-9745-751fce3dd08d", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -19143,7 +19231,7 @@ ] }, { - "uuid": "60b57f1f-580b-4365-8827-4880bbc97524", + "uuid": "18593676-fffe-4fba-9b76-079f5746934a", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -19160,7 +19248,7 @@ ] }, { - "uuid": "281b057b-5ed7-4582-97f2-e45ac7ea925a", + "uuid": "076aa3aa-efaa-4ad0-953f-188cd7cff81d", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -19177,7 +19265,7 @@ ] }, { - "uuid": "6f91a7a5-34f1-4908-873e-f69a3c1e929b", + "uuid": "83cb339f-921c-418c-82f2-7f11b7e5483d", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -19194,7 +19282,7 @@ ] }, { - "uuid": "9203b927-6917-4040-867a-40595bbcd7c0", + "uuid": "bd9309a4-452c-411a-8e9f-548055312a06", "control-id": "cis_fedora_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -19211,7 +19299,7 @@ ] }, { - "uuid": "c643136e-4298-4ee3-9054-eff6db1f1fd9", + "uuid": "e0b4c477-d3b1-456b-a5bc-443bc440cd19", "control-id": "cis_fedora_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -19228,7 +19316,7 @@ ] }, { - "uuid": "714d1647-27f0-474f-988d-ff6071ab9cf5", + "uuid": "65b297ba-98d5-40da-8e27-026ae2948c82", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -19241,7 +19329,7 @@ ] }, { - "uuid": "4296d760-ec00-4257-8bbc-246eabd6532b", + "uuid": "ab9c16ae-7369-4ee0-b31b-11698db275ce", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -19258,7 +19346,7 @@ ] }, { - "uuid": "2de657cc-6421-4846-b2ed-6716f282c55d", + "uuid": "8f152bbd-c277-40d7-9328-1c2adb3ae331", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -19275,7 +19363,7 @@ ] }, { - "uuid": "891f69ee-7f09-4cd4-85b8-e7019b56799e", + "uuid": "9ff32226-fbcc-4972-b749-a9fa57073bb9", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -19292,7 +19380,7 @@ ] }, { - "uuid": "5d8a56a4-19bc-4aec-9b52-d811fecae634", + "uuid": "8c6aa6f0-7cb4-419f-8158-f1c4cab99258", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -19309,7 +19397,7 @@ ] }, { - "uuid": "e46044e0-2853-4829-bfe8-0db7087f38c7", + "uuid": "269b8fd6-e552-4402-bff0-b211a9cdef83", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -19326,7 +19414,7 @@ ] }, { - "uuid": "47a6b2a4-3d27-463c-9447-596679fdc33a", + "uuid": "67d76d6a-4884-48b4-b901-75b0447a6d21", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -19343,7 +19431,7 @@ ] }, { - "uuid": "da1920b0-667f-4e54-944d-03125d0712fb", + "uuid": "4d173bc0-c6d2-4915-8271-74b8bf6d4b9a", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -19360,7 +19448,7 @@ ] }, { - "uuid": "4495d661-bb47-41fa-95e6-21fbb17cb8c1", + "uuid": "73c537b3-57a8-4eaa-9c54-3a0989e785da", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19377,7 +19465,7 @@ ] }, { - "uuid": "a74ac3c3-058d-4bf1-8308-1aa86f68c5d0", + "uuid": "367ae989-9da0-4954-b1c2-c9050d964a7d", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19394,7 +19482,7 @@ ] }, { - "uuid": "e21d9bc0-e9aa-4e3f-a037-af4285c958b3", + "uuid": "fc7230c9-b337-4e64-ab3e-05dc2691dca8", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19411,7 +19499,7 @@ ] }, { - "uuid": "7696e404-c7e0-4c13-afc3-5ad4db761c97", + "uuid": "b2ed5a4d-d2e0-463c-885c-b25d15a97d08", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19428,7 +19516,7 @@ ] }, { - "uuid": "765258ac-f724-4cb3-93ed-bafeb8389991", + "uuid": "57756857-7883-48c7-b845-fc336db35bb9", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19445,7 +19533,7 @@ ] }, { - "uuid": "0c66a956-cbcd-4cb1-9e43-8f915a1bf9ed", + "uuid": "c7a271d2-fdcd-4926-9ff3-a652f3e56734", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19462,7 +19550,7 @@ ] }, { - "uuid": "f329f029-bcc5-41a8-9a6a-9c623b6d6ac9", + "uuid": "a086026a-6c0f-46ec-991e-5e248e9b6bd4", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19479,7 +19567,7 @@ ] }, { - "uuid": "e04dde3c-3076-45a4-a516-7d5ca141fb6d", + "uuid": "2fb91734-91a6-432c-8f78-1db21ff1fadd", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19496,7 +19584,7 @@ ] }, { - "uuid": "439ce892-3511-4ca8-a312-a2dc6092b12b", + "uuid": "5c1c80a3-d702-4efc-ac36-4e80bd589a0c", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19513,7 +19601,7 @@ ] }, { - "uuid": "6abfcb7f-7c82-45b9-bbe8-be5957480d7f", + "uuid": "0ad556fe-7f57-417c-a2a6-fcc10ed885e4", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19530,7 +19618,7 @@ ] }, { - "uuid": "d512e157-f350-4fff-bf3f-18b095e737c6", + "uuid": "392c9f7a-1723-48bc-b107-92792ef2c0c3", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19547,7 +19635,7 @@ ] }, { - "uuid": "1b0d2f64-239e-4e9b-9842-536e0cacb265", + "uuid": "cf117951-5bab-44aa-b327-7a2ab0801fd7", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19564,7 +19652,7 @@ ] }, { - "uuid": "2df8f20b-4684-4bb7-b388-9a08e227992e", + "uuid": "65049b31-d7ab-4fcb-ae42-9ae7630c9585", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19581,7 +19669,7 @@ ] }, { - "uuid": "8a26ac96-8dc3-415c-a95e-530be7a67bd6", + "uuid": "71a54754-83c1-4017-af1f-db716e734433", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19598,20 +19686,24 @@ ] }, { - "uuid": "8846bfd7-99f2-4a4f-bb70-ea00316f3ad6", + "uuid": "c93dcb03-e4b8-4690-85fe-02955560bec6", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "222abb40-bcc9-4794-b144-ef5ea181fbbb", + "uuid": "21f53e49-7a12-4bcb-9714-4219ccd6d2e2", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19628,7 +19720,7 @@ ] }, { - "uuid": "b4400386-c8bb-4fa8-bb32-f456aefa4ca5", + "uuid": "ec710520-9760-458a-909c-95c3f65b0988", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -19641,7 +19733,7 @@ ] }, { - "uuid": "18f0811d-ffa0-4af3-84c2-5a45a7f9bde7", + "uuid": "6edcdc7a-f783-46e0-b580-db0f1b43416a", "control-id": "cis_fedora_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -19658,7 +19750,7 @@ ] }, { - "uuid": "94de4d83-9e3b-4167-8428-8497054091db", + "uuid": "f5340ef0-f080-4379-8672-2f3f82f43de9", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -19671,7 +19763,7 @@ ] }, { - "uuid": "efcd52b7-48d7-41ec-8f76-50cab12d8003", + "uuid": "7849a47b-9935-44f3-b84c-78e37f6da79d", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19688,7 +19780,7 @@ ] }, { - "uuid": "0eea3c3f-0a53-41c2-84dc-a5d4461b9e95", + "uuid": "079e2a92-5da5-4fb1-9d7c-10461f9ef284", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19705,7 +19797,7 @@ ] }, { - "uuid": "3aae8cbf-47ca-4601-a6b6-47d6c9d4e74e", + "uuid": "6d8a11c7-9331-423a-baa7-17f90f6efced", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19722,7 +19814,7 @@ ] }, { - "uuid": "c183a474-6051-48e0-a0e5-bbdca709d6d8", + "uuid": "2ac9acc3-7927-49cb-9f06-3c6aa0f331fc", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19739,7 +19831,7 @@ ] }, { - "uuid": "51479fbe-8425-490a-ab36-eb7926e33500", + "uuid": "8962dde1-5df4-46ea-930a-3680031116b2", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19756,7 +19848,7 @@ ] }, { - "uuid": "9ef90be7-01a5-4e4f-8c1c-1324da686567", + "uuid": "2fc47b39-a76d-4cd6-9124-f3770cd58114", "control-id": "cis_fedora_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -19773,7 +19865,7 @@ ] }, { - "uuid": "6da8b920-6990-4d47-a675-f55d6cdfc480", + "uuid": "7fdc1890-6366-48cb-b865-47feb721b6a6", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19790,7 +19882,7 @@ ] }, { - "uuid": "9f117bdc-4a8a-4b18-b411-eb0a203dfcdf", + "uuid": "32d144ec-3c0f-40cb-93d7-f69e7ab5eeea", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -19817,7 +19909,7 @@ ] }, { - "uuid": "9fe22ecc-d30c-4f9b-9a18-b1b0be51355a", + "uuid": "dd0f792e-cecf-4b44-ad81-956c1ec148c7", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19834,7 +19926,7 @@ ] }, { - "uuid": "b3cffd2d-46b3-4160-994f-b94953bbc6b4", + "uuid": "f8686e12-2268-44fa-9e65-3b8e1fdcae57", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19851,7 +19943,7 @@ ] }, { - "uuid": "7e66fea6-3577-4bf1-85cf-ef6109fad14e", + "uuid": "edf4a64c-efda-42ce-aeb4-82a483372f7d", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -19868,7 +19960,7 @@ ] }, { - "uuid": "f40e57fc-063a-4db8-9850-3192acfa3373", + "uuid": "40482df9-a896-455d-a26f-2222cb0f1bc8", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19885,7 +19977,7 @@ ] }, { - "uuid": "3ea00d19-7c91-4dca-8994-1b6ace6a45a2", + "uuid": "5ee877ca-f794-4e3a-a0c4-c9db721fe1b9", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19902,7 +19994,7 @@ ] }, { - "uuid": "997b5e82-a5e7-4143-ae07-962e265a116e", + "uuid": "cdb9ac69-5119-4fc1-9325-731e28e9128f", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19919,7 +20011,7 @@ ] }, { - "uuid": "47f2de7b-0481-47f5-afdb-20d588a556c4", + "uuid": "585f3fd7-4d72-4102-a16d-738109eef05c", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19936,7 +20028,7 @@ ] }, { - "uuid": "2a02ca2e-f845-4830-9066-90ab5357f3b0", + "uuid": "50981276-e697-4ba6-8a85-326b36c0b7d7", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19953,7 +20045,7 @@ ] }, { - "uuid": "8698c867-d899-4f78-b85a-0452cff94cf1", + "uuid": "a75bac27-edf0-42b3-81eb-85498a47f703", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19970,7 +20062,7 @@ ] }, { - "uuid": "25af054a-84bf-4c65-a428-e1a47cef3697", + "uuid": "f79d4ccf-f8e0-4750-bec2-9b150a7d5cf2", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19987,7 +20079,7 @@ ] }, { - "uuid": "730f2643-8b11-4107-a135-71eb55498058", + "uuid": "adcc6dce-474c-4346-a8ce-5ec67a121c49", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -20004,7 +20096,7 @@ ] }, { - "uuid": "301cf54a-bdd2-4535-801d-a7283fbee978", + "uuid": "18dc3f19-936c-453c-8c89-0e1f5fd67ac4", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -20021,7 +20113,7 @@ ] }, { - "uuid": "2f821a93-069a-436c-8e7c-4704a69e2e54", + "uuid": "3aabf7b4-0498-4912-8d15-ee8803bb1de0", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -20038,7 +20130,7 @@ ] }, { - "uuid": "3933bd4e-b014-4fc5-b81c-d8ea6e2e89d2", + "uuid": "e109bfb8-ca98-4574-acca-db3fa9a6b65b", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -20055,7 +20147,7 @@ ] }, { - "uuid": "18e53f9b-afc8-478e-abf9-bcffae8c52f4", + "uuid": "2667d25c-2fcb-4320-b554-0350ab418c63", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -20072,7 +20164,7 @@ ] }, { - "uuid": "4eaa09a9-75c3-4fef-a4dd-ecb0a2b6b2d7", + "uuid": "0ea57462-3496-4059-8000-06344b80f4bd", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -20089,7 +20181,7 @@ ] }, { - "uuid": "f876fe19-8207-4e33-89aa-e973a7ae07e1", + "uuid": "27ae91d5-f1ee-4969-9fcb-ea0187b5abe2", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -20106,7 +20198,7 @@ ] }, { - "uuid": "d36b2ad9-d555-4f7c-a1f9-a3d215c846a2", + "uuid": "61e87403-0ccc-4c07-ad0a-3dcef17bc041", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -20133,7 +20225,7 @@ ] }, { - "uuid": "ff6d4d24-1bd2-4274-b074-4355ff0bc74e", + "uuid": "cdb8e975-1eb6-4769-8ff5-edb44f527360", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -20160,7 +20252,7 @@ ] }, { - "uuid": "2407706e-5bb7-43a0-b497-16e3ea902731", + "uuid": "63f3fa0f-d206-46b6-9f8b-c6daf5bfcbdc", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -20187,7 +20279,7 @@ ] }, { - "uuid": "9f06270c-1a76-47cd-a702-9d9e54316384", + "uuid": "700d17ec-0dc2-415c-b5a9-8eb191ae4279", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -20209,7 +20301,7 @@ ] }, { - "uuid": "2e504a46-2b36-4cbe-b48e-4111c80790b5", + "uuid": "aaf19dd8-aa8f-4ea5-911a-db8bed05f5b7", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -20226,7 +20318,7 @@ ] }, { - "uuid": "4fb740e3-105f-4ebb-abb1-4c5ef744a2bd", + "uuid": "374cccec-6faa-4901-9274-ae298561b8e2", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -20258,7 +20350,7 @@ ] }, { - "uuid": "812af693-3d24-4cad-8c04-1a674faf5ce1", + "uuid": "a2b8dde3-8748-4a74-9fcd-7663927e5b61", "control-id": "cis_fedora_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -20280,7 +20372,7 @@ ] }, { - "uuid": "1d6cc1dd-b930-4f33-8ae4-78e335c3d0f2", + "uuid": "ba9c9067-7c48-44fe-8f27-490f5da87565", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -20297,7 +20389,7 @@ ] }, { - "uuid": "8d8c8caf-ec19-493c-bd1f-0201faaff9f3", + "uuid": "1d104931-e097-4576-bc53-89884cba0c10", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -20310,7 +20402,7 @@ ] }, { - "uuid": "74402835-b4f0-4097-a8c9-8ffc4eef7151", + "uuid": "7ecbddf8-8618-4d36-bfab-a46ccfdb5890", "control-id": "cis_fedora_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -20327,7 +20419,7 @@ ] }, { - "uuid": "5e1eb36f-e756-458d-94cb-398bdb305e95", + "uuid": "a5371d25-d727-4053-8717-a520a5b43596", "control-id": "cis_fedora_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -20344,7 +20436,7 @@ ] }, { - "uuid": "b2724f06-5993-4000-ba25-42bdc7223114", + "uuid": "a1a93798-8742-498e-9c51-764f5d026026", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -20361,7 +20453,7 @@ ] }, { - "uuid": "7593244b-8541-4374-be4e-646cfa37ad3d", + "uuid": "e921fb42-556f-4e66-af56-c5e0d761491d", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -20378,7 +20470,7 @@ ] }, { - "uuid": "6b4c48f6-f64c-4b82-93ff-898e7b69a9ea", + "uuid": "7ae71382-1eb3-4d0a-96d9-a639f2adfdcb", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -20395,7 +20487,7 @@ ] }, { - "uuid": "e4ecfa3f-d1ba-410a-b1dc-0af79adf6eed", + "uuid": "701bc3a8-473e-445d-a0c6-d4c7c250b063", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -20412,7 +20504,7 @@ ] }, { - "uuid": "618eb54c-7a43-41d9-96cf-fdc1844321f9", + "uuid": "6bda1c88-da44-4fa7-8a49-b032d27183de", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -20434,7 +20526,7 @@ ] }, { - "uuid": "d7f15ef6-7f11-46f8-8502-cdfaf235dc0d", + "uuid": "e7198eb1-9f42-4197-a887-c6d3428c5e5a", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -20451,7 +20543,7 @@ ] }, { - "uuid": "2f4f45c1-7d2f-4405-830c-0625ee4ab343", + "uuid": "6d1dbf66-90f0-49cd-90fe-a39143cc9300", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -20463,7 +20555,7 @@ ] }, { - "uuid": "9570b194-c95a-48e2-8e0d-dca260d69eec", + "uuid": "275ef244-4521-415c-904b-db14665b1b03", "control-id": "cis_fedora_2-1.11", "description": "No notes for control-id 2.1.11.", "props": [ @@ -20480,7 +20572,7 @@ ] }, { - "uuid": "87fe3f2f-62d9-477a-a9e9-3ec7e8ef62cc", + "uuid": "e2dd6ca4-2201-41bb-a74f-c5357386c195", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -20497,7 +20589,7 @@ ] }, { - "uuid": "8d3affb1-1b95-47a3-96d9-a3cb70929db9", + "uuid": "524621c4-f7cc-435a-b6c2-f68a4570bc3f", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20514,7 +20606,7 @@ ] }, { - "uuid": "76cddd2b-29a3-4043-8212-37ad826e01ba", + "uuid": "1bee5250-5aa4-4651-8a73-ed3cd3b00444", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20531,7 +20623,7 @@ ] }, { - "uuid": "2c2cf694-e9b0-4ce5-8d3f-f96a681fc020", + "uuid": "a8d42f37-ca9b-41cc-b6e6-dc1accb07a28", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20548,7 +20640,7 @@ ] }, { - "uuid": "0e3b10f6-bb07-4781-8ee5-d4b6738756b0", + "uuid": "9f63f4ea-6e89-48ee-8959-718367615757", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20565,7 +20657,7 @@ ] }, { - "uuid": "6dd7f76e-a636-4b11-940c-4df0f9a905b3", + "uuid": "bff57ba2-c36e-4564-bcd7-4efbcab5407a", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20582,7 +20674,7 @@ ] }, { - "uuid": "bc9e8288-b40a-4d17-a27a-398be5ea3128", + "uuid": "14c46399-b342-4d96-aabf-4637cad39b5e", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20599,7 +20691,7 @@ ] }, { - "uuid": "8dde8171-4c97-4f0a-aadb-10122baed69d", + "uuid": "6340c70f-e5f1-432d-9daf-a1cb1e9a7449", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -20621,7 +20713,7 @@ ] }, { - "uuid": "cfd14844-3cc8-4b83-8d8a-4d53e713d352", + "uuid": "6d4582d3-9770-4ab6-a5ba-c28878dc25dc", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -20634,7 +20726,7 @@ ] }, { - "uuid": "5dbdb754-5cb1-4fda-8cd7-9209aa6c4871", + "uuid": "70b5495a-affc-4b97-a83e-e8fcda159d2c", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -20656,7 +20748,7 @@ ] }, { - "uuid": "5e366deb-0cfb-4cda-b2f3-8cdd609e386c", + "uuid": "51597c6b-9ad1-471b-b6c8-5f4a8b1ae8fd", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -20669,7 +20761,7 @@ ] }, { - "uuid": "a4ad79fc-c78e-40cd-b64c-ca54d272aefd", + "uuid": "91035840-5ce2-45a3-857f-0d0262fc1a00", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20686,7 +20778,7 @@ ] }, { - "uuid": "3fe7998f-6363-4610-a125-02d28eb91227", + "uuid": "83e7cf2a-e124-4aea-9ede-dae6d93042d6", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20698,7 +20790,7 @@ ] }, { - "uuid": "75fc2400-b503-427a-a2da-c64b07c174e1", + "uuid": "9e73dbde-a899-474a-ba8a-3877444085df", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20715,7 +20807,7 @@ ] }, { - "uuid": "ec0c22c0-50f4-4528-bc63-67286ee703b2", + "uuid": "c09a6646-5845-4156-b1a2-333b26d0b798", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -20732,7 +20824,7 @@ ] }, { - "uuid": "edd5f43d-7a8d-4f09-86e2-31dc989fa126", + "uuid": "3dae5c68-c0b2-4fa3-bb75-687ee90b6a09", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20744,7 +20836,7 @@ ] }, { - "uuid": "1c529616-d39e-4aa7-94b5-bb6422be7001", + "uuid": "de4739e6-320b-4348-8738-7267cd83eae9", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20761,7 +20853,7 @@ ] }, { - "uuid": "b894dd83-c53a-4003-bbf8-c7afdb86d0cb", + "uuid": "f7053e3b-e90d-4879-8c24-e5478c3b3063", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20778,7 +20870,7 @@ ] }, { - "uuid": "b0189c7d-fc00-4de2-8a0e-4222857e481f", + "uuid": "d3818088-4a7c-4ee3-8221-01bac853269b", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20800,7 +20892,7 @@ ] }, { - "uuid": "ff2ab248-615f-4ea6-93ad-736a46d1fc0a", + "uuid": "cec64fd5-88ee-4362-891a-a43ab6867a57", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20827,7 +20919,7 @@ ] }, { - "uuid": "c2a87089-28d2-4230-9b45-26a57c7c565d", + "uuid": "45345a18-f3be-4634-b9e9-7c5ed2edf77d", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20854,7 +20946,7 @@ ] }, { - "uuid": "f638381a-0afb-43fb-b097-b7c58637880e", + "uuid": "41660a68-9c30-4d34-b078-a36658c883c8", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20881,7 +20973,7 @@ ] }, { - "uuid": "5f021064-d39e-429f-82c6-4849eea96139", + "uuid": "476b86b0-62e6-4a48-8ece-776baaa45e7a", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20908,7 +21000,7 @@ ] }, { - "uuid": "f3282371-e42e-475e-8544-1e50c1a30a3f", + "uuid": "eb521775-d5b9-40b2-bc73-6dceb9dc801e", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20935,7 +21027,7 @@ ] }, { - "uuid": "580312e1-fe43-4416-9190-8ad4de29b3bf", + "uuid": "e8aba29d-35cb-447c-a4c6-cc4141aae64f", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20962,7 +21054,7 @@ ] }, { - "uuid": "89c0a4f8-08d6-4084-9c28-a92d4ef78762", + "uuid": "1259dddb-9883-4b99-9c26-1c16b47c924b", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20989,7 +21081,7 @@ ] }, { - "uuid": "3c38c3e4-33f4-440f-907b-2f7b032590f9", + "uuid": "b0fe1892-f4b4-4b81-931c-2a8cde111731", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -21026,7 +21118,7 @@ ] }, { - "uuid": "3a9b14c0-6d4a-4751-9755-f3efcd2808e1", + "uuid": "2d702c84-c0ae-45b5-a1b4-a4cf8ac0124e", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -21063,7 +21155,7 @@ ] }, { - "uuid": "25eebf30-8beb-48de-86e6-e0e7ade2f3f9", + "uuid": "e538d43a-12f9-477d-be0f-bec4fc840a1b", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -21076,7 +21168,7 @@ ] }, { - "uuid": "4f8dd9e7-a11b-439b-9ffd-9a0552484843", + "uuid": "917530b9-5473-45f2-b1d7-5bb18002c12a", "control-id": "cis_fedora_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -21093,7 +21185,7 @@ ] }, { - "uuid": "ed220b74-b782-4ad8-8900-8899dcb54737", + "uuid": "2ac64fa5-3389-41a9-bb89-5e29593bd375", "control-id": "cis_fedora_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -21110,7 +21202,7 @@ ] }, { - "uuid": "a9b4a9a3-efe8-457b-bb2a-85c7e22cebcc", + "uuid": "459b18f2-b154-4a13-8e56-23d7a1a023dd", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -21127,7 +21219,7 @@ ] }, { - "uuid": "b6692831-8d82-4efc-9516-4f497f6a30a1", + "uuid": "d4c30d5d-e82c-4952-a4da-068856956d59", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -21144,7 +21236,7 @@ ] }, { - "uuid": "5ab45092-8cda-428c-b1a9-4bb875128b30", + "uuid": "715d2f59-fa15-4d21-a505-77659c05d103", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -21161,7 +21253,7 @@ ] }, { - "uuid": "5fc7b5a3-8ba0-4240-95bb-72b5e3aa5ffc", + "uuid": "0d4c4f4d-ee54-4bca-93eb-6b95af103c37", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -21178,7 +21270,7 @@ ] }, { - "uuid": "17c5ece7-f810-494e-a2a0-b4fae8dd40bb", + "uuid": "d1656457-3a8c-4245-a59a-bdbe25a890bf", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -21195,7 +21287,7 @@ ] }, { - "uuid": "a62c0c01-8361-4d07-bbc6-de59b4089721", + "uuid": "a395a4fe-98cf-45a0-a948-14631ce07c79", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -21212,7 +21304,7 @@ ] }, { - "uuid": "c09223a0-3d15-4c37-be76-6c13237c11d5", + "uuid": "f5d26386-3a60-40d3-932a-35c0b3058794", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -21229,7 +21321,7 @@ ] }, { - "uuid": "078f3108-2277-4968-b66e-93b1612bc597", + "uuid": "d9f693b1-d679-437a-97c6-88c6163891d2", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -21246,7 +21338,7 @@ ] }, { - "uuid": "dec57dfb-d69f-4f78-98eb-864faadcd486", + "uuid": "fd166f20-d2bc-4352-9869-0999be77409c", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -21263,7 +21355,7 @@ ] }, { - "uuid": "dbf19534-4450-4d73-b610-358b792730b4", + "uuid": "4d71a367-2a99-4d88-afc2-5ee893e548cf", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -21280,7 +21372,7 @@ ] }, { - "uuid": "601f2d3d-17fc-4616-8309-b4f02308e0d3", + "uuid": "24a56244-d3e1-4d77-bda4-2c3008a3e221", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -21297,7 +21389,7 @@ ] }, { - "uuid": "d57a374e-3494-4f88-bab0-9583b705f8ed", + "uuid": "39bd87de-113f-4633-972d-e57f69eef4d0", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -21314,7 +21406,7 @@ ] }, { - "uuid": "c03b7ed3-c079-49cc-8255-b750aa88938f", + "uuid": "52f38d01-91b1-41ee-aa06-877c7a6732b9", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -21331,7 +21423,7 @@ ] }, { - "uuid": "a59a9e05-7ea8-40c8-8e70-7297d9cbe232", + "uuid": "496b0c9a-d347-4135-91ef-628498ee38ae", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -21348,7 +21440,7 @@ ] }, { - "uuid": "f6402a7d-8f66-4eff-87f3-4ca59c45e30b", + "uuid": "feb0d5d7-4a87-47b2-8bf9-c8ff6a468a00", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -21365,7 +21457,7 @@ ] }, { - "uuid": "080041fa-ba6b-41f3-98ae-8db2948621d1", + "uuid": "d5da1993-58bd-473a-9a33-1e821ae2e5ef", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -21382,7 +21474,7 @@ ] }, { - "uuid": "1a5887a7-d7b3-4bc9-b2c9-de98cecb779d", + "uuid": "7d2489dc-b9b9-45a6-8ae8-9348d8ef5a55", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -21399,7 +21491,7 @@ ] }, { - "uuid": "6b49274e-d48e-464f-9476-258fa8052cb2", + "uuid": "fabfb7c1-5ef3-48be-bfd1-4255ccccbafb", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -21416,7 +21508,7 @@ ] }, { - "uuid": "077c941e-da42-4619-bb45-801def542dbd", + "uuid": "2fd6d598-f7c3-4c97-9063-489ba8031c6d", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -21433,7 +21525,7 @@ ] }, { - "uuid": "515a68b9-2008-4af2-8c10-6b14a92d731d", + "uuid": "a501aeb4-d50c-4b5a-ba3e-c623b3c6dacf", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -21450,7 +21542,7 @@ ] }, { - "uuid": "56041bb1-57e1-434c-8b75-af4e9340d54f", + "uuid": "80bbad72-78eb-4873-8f67-ed30153fd464", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -21467,7 +21559,7 @@ ] }, { - "uuid": "71a9e00a-11cc-4f18-99a8-f7df4e4f7a2b", + "uuid": "55bc011d-11b5-4246-bb1e-034031520207", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -21484,7 +21576,7 @@ ] }, { - "uuid": "cf289e12-53e2-45eb-ba10-67f59cc3784b", + "uuid": "73b9f035-8879-41e3-8df8-9d7bab4a9d16", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -21501,7 +21593,7 @@ ] }, { - "uuid": "600c77c4-a689-4d02-9eeb-f6042dd8e22b", + "uuid": "9b4f97ee-c99b-47c7-a31d-1c756e2572e7", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -21518,7 +21610,7 @@ ] }, { - "uuid": "021e8616-94ac-44bd-98fe-ad61a6b8c145", + "uuid": "1a2ab764-f1a7-4b0b-80d0-e6384fb40acb", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21535,7 +21627,7 @@ ] }, { - "uuid": "f18ca117-8f14-4e5d-8561-090b8573e4ee", + "uuid": "ada120b1-97bf-42d3-8a62-cca755f035c3", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21552,7 +21644,7 @@ ] }, { - "uuid": "3ff95f93-3a64-4824-9e0d-5c37f7e28823", + "uuid": "6fde0f6d-25b5-4764-ab04-380905d8f71a", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21569,7 +21661,7 @@ ] }, { - "uuid": "c4e7c69e-258e-4936-99f2-d35f76c6115c", + "uuid": "28802e87-f166-4348-af72-652300159727", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21586,7 +21678,7 @@ ] }, { - "uuid": "f2b226b2-f9f6-4beb-8175-87be8a2d85c9", + "uuid": "2e0aae31-64eb-4871-9c4c-2be02b5aa3b8", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21603,7 +21695,7 @@ ] }, { - "uuid": "8d9fcbf3-9146-42cc-ad84-82eb000e33d3", + "uuid": "29440d50-f1cc-401f-a329-32c99526b0e6", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21620,7 +21712,7 @@ ] }, { - "uuid": "817b24d5-d9f3-4e64-8ec0-1864f33359c7", + "uuid": "df1c88da-67d1-49c5-a17a-bdb707777217", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21637,7 +21729,7 @@ ] }, { - "uuid": "73a95b89-d3f5-4160-9b3e-31bac49f060f", + "uuid": "914420b2-9a6d-478e-8525-465e079a8ab6", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21664,7 +21756,7 @@ ] }, { - "uuid": "2074f882-27df-4b97-8f94-92d5126dcf28", + "uuid": "f9e1ad8c-f01c-4e01-8612-01cdedd4af2a", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -21677,7 +21769,7 @@ ] }, { - "uuid": "24a55dc7-c4b7-4c4b-8287-0d7af032bdd6", + "uuid": "7a30ccb2-5f22-4d7f-ab2b-951c3c01859b", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -21699,7 +21791,7 @@ ] }, { - "uuid": "211fa4e4-0a1c-45cb-9ead-b419635c847c", + "uuid": "db14a8ca-215a-4ac7-aab3-fb8a26c8864a", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -21711,7 +21803,7 @@ ] }, { - "uuid": "1cb8d848-4fca-4f60-a3dc-818654c171bc", + "uuid": "a1007e16-00f5-4296-a951-2ef937fa2463", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -21724,7 +21816,7 @@ ] }, { - "uuid": "2985fa02-6e60-454b-b4af-ad15eb60f731", + "uuid": "e893e3ee-7b36-47bb-b533-57309cf167a3", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -21736,7 +21828,7 @@ ] }, { - "uuid": "879f9a26-6b24-4918-a4a4-c2489b53959f", + "uuid": "9bbaba3e-5457-438f-998f-4955f92409a9", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -21748,7 +21840,7 @@ ] }, { - "uuid": "02830063-930f-49d1-b35b-84fc21fd9297", + "uuid": "2bb3f175-730c-4095-ac2b-8097246f1772", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21805,7 +21897,7 @@ ] }, { - "uuid": "4eed6e45-ba44-4024-b9e6-700c20667f87", + "uuid": "43769687-8b88-48e9-9f6c-e14a08b89a45", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21832,7 +21924,7 @@ ] }, { - "uuid": "e3503780-5427-4d09-8cdf-9ae3258c010e", + "uuid": "2017a1cc-6f63-4ec3-8c8c-0f4be164cea7", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21859,7 +21951,7 @@ ] }, { - "uuid": "73734e39-129a-44da-aeff-717bb67945eb", + "uuid": "a49269ad-6837-4ced-bb07-0a64eba188fa", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21876,7 +21968,7 @@ ] }, { - "uuid": "9079b154-6b2c-4512-b4cb-04351818d3eb", + "uuid": "82e5ece0-1dd6-4a54-86f5-dd4491625d8a", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21893,7 +21985,7 @@ ] }, { - "uuid": "282351bc-0899-4777-a3b1-2a49f382b2b0", + "uuid": "de451009-50f6-4bc9-8e3a-0348248e1e16", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21910,7 +22002,7 @@ ] }, { - "uuid": "1e11d11d-1259-4b71-a5d8-0697c803142d", + "uuid": "93365692-7787-470b-87a9-cd2b498f804a", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -21927,7 +22019,7 @@ ] }, { - "uuid": "007e8227-b650-4fd1-9390-6393a2156fbb", + "uuid": "0ac75e5f-1790-400c-af36-44cfeeacdb3d", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -21944,7 +22036,7 @@ ] }, { - "uuid": "0916af68-4eeb-490e-9d7d-fc1a149ff134", + "uuid": "6e1b624c-c9d6-4a15-bfe5-39aed2ba6335", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21966,7 +22058,7 @@ ] }, { - "uuid": "9bf6f60b-12ca-4cb4-b18b-e74a87929cbf", + "uuid": "369453f9-4928-4bba-8deb-eec6aec969b2", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -21983,7 +22075,7 @@ ] }, { - "uuid": "320ee1bf-ec3a-4c37-a5b8-c52569842cc0", + "uuid": "31222373-b15a-43ef-ac8d-cb6d4523141e", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -22000,7 +22092,7 @@ ] }, { - "uuid": "49ddd0e2-b433-4e9e-b732-274d68ed381b", + "uuid": "2cb86b8e-1742-4175-a5c1-2453f0f10883", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -22017,7 +22109,7 @@ ] }, { - "uuid": "40e93a49-c74a-4f50-af42-55d81d9e9159", + "uuid": "7ce4fc71-eab9-4272-93d0-dc8fc2cb49b5", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -22034,7 +22126,7 @@ ] }, { - "uuid": "ef2206fd-0c91-4bc1-ae24-11fe043afda4", + "uuid": "25c5fd97-ed7a-4116-81db-4f9769c2233b", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -22051,7 +22143,7 @@ ] }, { - "uuid": "31331d28-4dca-4500-8e13-e6dada5c8477", + "uuid": "a3dac850-5324-4aa0-93a4-2bc2dfb8ae41", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -22068,7 +22160,7 @@ ] }, { - "uuid": "27367aed-c390-44f7-bc6c-fcda76ac5c68", + "uuid": "a2068bd9-ad1a-4ca9-9ae5-358355eb5622", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -22085,7 +22177,7 @@ ] }, { - "uuid": "250192fc-a432-47b7-85d8-d31e77f7310a", + "uuid": "9a78e09a-afd5-41e2-a071-f6c30b4a53a1", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -22102,7 +22194,7 @@ ] }, { - "uuid": "01be8e1c-aa79-4f12-a9bb-a7f7d18612d3", + "uuid": "2440b997-2b9f-49f8-8649-b7ce02d39668", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -22119,7 +22211,7 @@ ] }, { - "uuid": "6161f927-52cd-47c6-baba-53cc1cd5199e", + "uuid": "06860369-55f4-49e7-b849-9cce25e4dbec", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -22136,7 +22228,7 @@ ] }, { - "uuid": "05999faa-67e4-4d00-938b-f6755eb38b3a", + "uuid": "34d375e1-a779-4b17-bedf-742ca48ff8ab", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -22153,7 +22245,7 @@ ] }, { - "uuid": "db6acaed-5fcf-4f60-bde9-099ce155e7c8", + "uuid": "3af139d0-2d93-4732-9680-21b16f1b6da5", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -22170,7 +22262,7 @@ ] }, { - "uuid": "7b7abb0a-33f7-4084-ae01-eb236da01e64", + "uuid": "8ab23ed8-ec29-449e-8f3f-3ee047612278", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -22187,7 +22279,7 @@ ] }, { - "uuid": "b4290a12-a18a-4e21-bd6f-96b5d1455718", + "uuid": "01d072aa-c3b9-4262-82e5-87018cd8c3e2", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -22204,7 +22296,7 @@ ] }, { - "uuid": "bd7e0cb5-389e-496b-99ee-fa76709b6987", + "uuid": "ddd967b3-4e26-4d65-b2d5-b953e1ac5975", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -22221,7 +22313,7 @@ ] }, { - "uuid": "04440316-2ea8-4abf-a603-c2eb5aca366c", + "uuid": "a9d760ac-7382-46b3-9661-1c44107caa33", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -22238,7 +22330,7 @@ ] }, { - "uuid": "8359db6b-0fc0-486f-983d-8ac80a9555c4", + "uuid": "4a95f621-0502-400c-a15b-993796ed87a2", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -22260,7 +22352,7 @@ ] }, { - "uuid": "0e7b5fd0-8442-4c61-b05d-0065e2746c63", + "uuid": "f40e21b8-86fa-4e69-aa9c-2bf5c84e9e2b", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -22273,7 +22365,7 @@ ] }, { - "uuid": "44b520dc-e114-4a5c-bc99-7cbe55b2e494", + "uuid": "d617fce1-9418-4c31-8218-d34646287cff", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -22286,7 +22378,7 @@ ] }, { - "uuid": "20603aa5-2062-4f91-a37f-0fb7668006f7", + "uuid": "32aa3d95-bd30-4e36-a20c-f7e9afafaff8", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -22304,7 +22396,7 @@ ] }, { - "uuid": "62ace21a-2c1b-4c05-ae78-975918a454bd", + "uuid": "423880fa-e961-4147-b9ea-b738ff8feec4", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -22321,7 +22413,7 @@ ] }, { - "uuid": "035ae031-70fe-4f48-89d3-37e863134952", + "uuid": "edda4e93-d05f-405b-883f-e33b27ce5d8e", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -22343,7 +22435,7 @@ ] }, { - "uuid": "975cbe19-fa25-4e1c-8702-d8f9e639c1da", + "uuid": "8827f685-6a41-4f3e-9d70-cab76e08fb37", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -22370,7 +22462,7 @@ ] }, { - "uuid": "22a3a01c-4a9d-44b2-ab3e-570834635ddc", + "uuid": "8ff1d9de-90fe-4a87-a93a-7568153b4ee8", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -22382,7 +22474,7 @@ ] }, { - "uuid": "36fe42f1-380f-425a-ba96-7c70cac2c64e", + "uuid": "3c25aabb-6854-4cf9-a6a0-c4482fe0e185", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -22399,7 +22491,7 @@ ] }, { - "uuid": "f0d1f0c3-8823-4044-82b4-2901ab589617", + "uuid": "4d10bf3a-04ae-4af6-ae56-4d23152d252a", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -22416,7 +22508,7 @@ ] }, { - "uuid": "353c80ba-6091-4daf-942b-a08af6a7b909", + "uuid": "21fa20fb-675d-4044-a76f-7c64939aec43", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -22433,7 +22525,7 @@ ] }, { - "uuid": "4dd5cc77-321e-4250-9905-29b61cd0d906", + "uuid": "e048d1d9-ebc0-441a-80d8-3bb7b59319c6", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -22450,7 +22542,7 @@ ] }, { - "uuid": "ee82ca88-cf4d-4fa9-8a91-04cacb0c7a3d", + "uuid": "4f7d8d72-d287-4983-a05e-7dadbdd732b2", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -22467,7 +22559,7 @@ ] }, { - "uuid": "e12a4814-730f-423b-a370-b1f1a3da8d2e", + "uuid": "07b3e24d-d66d-4bb5-83ba-50c25adab4c5", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -22484,7 +22576,7 @@ ] }, { - "uuid": "d856078a-05a2-4226-9062-f34c5e03ffba", + "uuid": "bd1c9a95-2d79-47c0-a8be-c8f8a355702d", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -22501,7 +22593,7 @@ ] }, { - "uuid": "6078303b-3f50-4b64-a52b-3cd3ac2837cb", + "uuid": "a1fbcc5a-b317-457d-b12d-fe5d68203e0d", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -22518,7 +22610,7 @@ ] }, { - "uuid": "0e0728c9-0c80-479d-a4d4-2abc9835a992", + "uuid": "3f99a6ca-026f-4587-bcd8-7888f60466c5", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -22535,7 +22627,7 @@ ] }, { - "uuid": "953e661a-dd8d-4437-a382-09bd173b6394", + "uuid": "a670a78a-839d-4616-bbac-0d2f5801f00d", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -22552,7 +22644,7 @@ ] }, { - "uuid": "7e47ab3f-6bfb-4189-b09a-a7d50bc01603", + "uuid": "91d17f57-9f12-4577-8823-9eb189a1a85f", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22574,7 +22666,7 @@ ] }, { - "uuid": "c54825f0-6ca8-4fd3-af65-94f0a6a0995b", + "uuid": "008986b4-8925-4ff4-a209-26ee7efcd5bf", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -22587,7 +22679,7 @@ ] }, { - "uuid": "0ece229f-776f-4f17-b6e5-09aabc3cb651", + "uuid": "5b64d580-adf6-4e2b-8db1-58a804f3af7a", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22604,7 +22696,7 @@ ] }, { - "uuid": "b36ae4da-6032-4de8-996a-66d57b55fe79", + "uuid": "435f8773-8e35-49fb-9152-301c30c988a3", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -22621,7 +22713,7 @@ ] }, { - "uuid": "6b6a1c4f-1a34-493c-8dc9-7daa516bc6fd", + "uuid": "d33a8c27-ffb1-4fae-9699-fa9517fab59b", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22638,7 +22730,7 @@ ] }, { - "uuid": "e6b1579e-1d1e-434f-8855-6bc397d153c6", + "uuid": "dfe5f8a0-256d-45a3-a126-fb19c7913ede", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22660,7 +22752,7 @@ ] }, { - "uuid": "bf786a8e-cdb8-43c0-b747-a24c4e13a8d7", + "uuid": "1dd4e3a5-8791-4b0f-949a-0a4c781a3e67", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -22677,7 +22769,7 @@ ] }, { - "uuid": "868c7bc7-fd41-4bb9-a698-291ba36aaa08", + "uuid": "e1f681dc-c156-4d80-ba42-d1acddfbcbca", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22699,7 +22791,7 @@ ] }, { - "uuid": "f0507fae-28f4-4aef-a879-f79de7eebbbf", + "uuid": "c5078a01-1411-4d7e-89a0-f3c6cfd1c6b8", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22721,7 +22813,7 @@ ] }, { - "uuid": "4fc4360c-af04-40f7-aeec-9e9007c6a4bf", + "uuid": "dbcbc47a-90f5-477f-900b-2bba7d4ac6df", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -22738,7 +22830,7 @@ ] }, { - "uuid": "438093e9-5cc4-45e2-b6ab-1721eefa69b6", + "uuid": "c65c8cfa-8397-4eca-b39f-abfb51b96dc3", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22760,7 +22852,7 @@ ] }, { - "uuid": "9672a3f0-41c4-4bf4-ac00-40d6f9a8cbab", + "uuid": "766244de-c25f-4155-ba8d-cf4b927531d5", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22777,7 +22869,7 @@ ] }, { - "uuid": "778f4490-f519-4f13-92ef-8e8da342a1cf", + "uuid": "ea3b672f-ebaa-47cc-8d04-7d96c3f296d0", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22794,7 +22886,7 @@ ] }, { - "uuid": "c32acb09-d14b-49e8-97cb-cefb53d8f5f5", + "uuid": "248dd828-4042-41ba-ace1-bd3834092426", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22811,7 +22903,7 @@ ] }, { - "uuid": "8fd06de1-2bf7-4f79-8cfd-8ce4bd0eaf59", + "uuid": "8e0fe39f-0ff8-4374-8194-097f7137588a", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22828,7 +22920,7 @@ ] }, { - "uuid": "e38d51f3-d8a2-43e1-9162-c0e35119600e", + "uuid": "673ca905-befd-4273-b4d0-66c0a9db5f71", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22845,7 +22937,7 @@ ] }, { - "uuid": "3d01b853-bcc0-4966-9f86-e5d0707557ec", + "uuid": "0d67757b-4795-4219-a041-8b097fc5130e", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22867,7 +22959,7 @@ ] }, { - "uuid": "07544245-357d-441f-b294-b0a912897061", + "uuid": "1138a85b-2df0-4a3a-a1b4-b54e22085600", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22884,7 +22976,7 @@ ] }, { - "uuid": "b11d184d-7b27-4147-96e6-63907299a3d0", + "uuid": "0ae16648-9c7a-4a55-8bd9-9e129b3ab7c3", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22906,7 +22998,7 @@ ] }, { - "uuid": "c801669e-a429-4951-9d23-787070add1dc", + "uuid": "3bdccddc-b473-42e0-ae10-ccb3e20ca84a", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22923,7 +23015,7 @@ ] }, { - "uuid": "18b21c0d-eedf-41ac-b6b0-d436a4fc3c7a", + "uuid": "77585089-13f2-4ecd-8b95-fc31546d6fd2", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22940,7 +23032,7 @@ ] }, { - "uuid": "8ea89c70-8ad7-4963-a19b-b7ea38ff0db8", + "uuid": "5d418081-2fa9-4705-9fac-a45c09694188", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22967,7 +23059,7 @@ ] }, { - "uuid": "a27d1ce9-ca19-4198-87a5-e66179d26700", + "uuid": "7ce9b334-53ec-45cc-8fa1-6178e0d7b9d9", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22989,7 +23081,7 @@ ] }, { - "uuid": "b7125f7a-8f6a-4a4c-b80c-a56a467cd727", + "uuid": "5627d58f-26dc-4763-8c7a-beb8a4b7ded4", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -23006,7 +23098,7 @@ ] }, { - "uuid": "233e3cbc-6d87-454a-9e9c-6312147f8dbb", + "uuid": "7b28ab85-9d36-407f-a5ad-e7763d936a75", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -23023,7 +23115,7 @@ ] }, { - "uuid": "ac655d02-a0d3-4539-b287-20524d5ae541", + "uuid": "c5ddfa05-2c3d-4c3a-a94e-e6a904b80c76", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -23040,7 +23132,7 @@ ] }, { - "uuid": "48aba5bb-efae-4e3e-b734-29c74042be13", + "uuid": "d2e4fd7e-0168-4000-8394-434ec2c4be1c", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -23053,7 +23145,7 @@ ] }, { - "uuid": "0ac300c6-f379-4534-9d51-78af33e5c60b", + "uuid": "2cb3f4d2-39fe-4e77-92ac-861415222838", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -23066,7 +23158,7 @@ ] }, { - "uuid": "43e02b43-222a-4031-83a5-50eb5f2f00b3", + "uuid": "ce70d87c-a120-4214-9686-a8ec2b59b3ec", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -23083,7 +23175,7 @@ ] }, { - "uuid": "77970b19-5e36-440c-90fa-3bb997d10bca", + "uuid": "598df309-d936-4003-bfcf-027574beda4f", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -23100,7 +23192,7 @@ ] }, { - "uuid": "e47dc7b1-2928-4f0f-8db7-d67e7da5e693", + "uuid": "9ee6785a-c44c-41d0-93d8-a43c4c421fc3", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -23113,7 +23205,7 @@ ] }, { - "uuid": "5292a234-0847-4797-9f3b-6a7b846beff3", + "uuid": "e30aa85d-cadc-44a3-903f-d7a594fa87bd", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -23130,7 +23222,7 @@ ] }, { - "uuid": "20ac8153-ab9f-4b00-b062-fcd791e2bfae", + "uuid": "66660a04-615e-4bc9-8180-8a2e9414f8f2", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -23147,7 +23239,7 @@ ] }, { - "uuid": "d38a72fb-83df-4e70-bddc-5ea34a397d15", + "uuid": "6ad9170e-56ad-466e-8589-f9ef9d5feb07", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -23164,7 +23256,7 @@ ] }, { - "uuid": "90bea8ba-58f5-4575-98bf-bd02bd0eea30", + "uuid": "2daeff95-0dcc-4d33-8190-1dbbe0898497", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -23181,7 +23273,7 @@ ] }, { - "uuid": "d1c2353d-37ff-4a3b-8a9c-a682b4a5e4fb", + "uuid": "98774211-f466-4412-a306-1fa2cf292c44", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -23198,7 +23290,7 @@ ] }, { - "uuid": "0738200f-7a30-454d-bc67-a3b56541cfc5", + "uuid": "12d2abbe-5e1c-4082-aa00-629409dc3eae", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -23210,7 +23302,7 @@ ] }, { - "uuid": "298cdea3-d1ff-40a7-9507-ec4e4ff963cc", + "uuid": "c3b93e59-9698-488b-b869-87181d5c2f08", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -23222,7 +23314,7 @@ ] }, { - "uuid": "9012e3e5-de9e-44a9-9eeb-e4932bad75a3", + "uuid": "60ddee92-214a-4acd-838f-2cba303478d7", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -23234,7 +23326,7 @@ ] }, { - "uuid": "9e77eca0-5404-42ef-9c0a-6272c19e5dd0", + "uuid": "d8e6d56a-7fc3-4447-9eb3-2b2b91c4f815", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -23246,7 +23338,7 @@ ] }, { - "uuid": "f2dad1f8-9512-446a-a158-ccbe1954b4a5", + "uuid": "44e896a5-b6f9-478c-aba2-53199ffe344f", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -23259,7 +23351,7 @@ ] }, { - "uuid": "c557a226-7de1-4512-a7a2-0df0d29ea858", + "uuid": "a6e49439-b393-45e3-adf9-ee437067bab7", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -23272,7 +23364,7 @@ ] }, { - "uuid": "ffb4c9d0-d517-4c0d-8fe9-e75de4630989", + "uuid": "1611b1f4-4916-4583-a139-006278e24df5", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -23284,7 +23376,7 @@ ] }, { - "uuid": "36051266-731c-48a4-a4bf-52b704203794", + "uuid": "6a3bcfb4-ae32-45e8-b1a5-1ee8a775e15f", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -23297,7 +23389,7 @@ ] }, { - "uuid": "87180f58-c46b-46b2-a383-068c816f6824", + "uuid": "b0bb9dac-0b64-4cae-89c1-e5e2fc27288c", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -23324,7 +23416,7 @@ ] }, { - "uuid": "a0457c07-c7a0-4258-8a43-cc14c0eebb7d", + "uuid": "f5fcb31f-a55d-44a1-986a-1aa6c50c891c", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -23351,7 +23443,7 @@ ] }, { - "uuid": "dca5cbc3-3ef3-4d6e-99f0-b9a19b2b6d66", + "uuid": "48f3fabd-daa1-4c84-b1af-f74d558b3a2b", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -23378,7 +23470,7 @@ ] }, { - "uuid": "5ac59534-b488-4a87-88e2-8a5440d0dafe", + "uuid": "ad7aa8f2-03ff-4446-8ca5-f32774bcd661", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -23405,7 +23497,7 @@ ] }, { - "uuid": "e5957ad0-6460-4e80-bb72-0a43c2988f98", + "uuid": "55722cb4-75e2-4fa9-803b-938b54ab4819", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -23432,7 +23524,7 @@ ] }, { - "uuid": "cf0ea202-f284-49d6-bd04-5ce407289eff", + "uuid": "e7f83e1f-d75e-4160-abd1-6ce7ef507819", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -23459,7 +23551,7 @@ ] }, { - "uuid": "23223023-d2c3-40d7-bf9a-8a30fc1d67d9", + "uuid": "c0c4114c-cbb0-4231-bb77-97b2b1c25dcd", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -23486,7 +23578,7 @@ ] }, { - "uuid": "314aec83-dfac-49f7-883e-3e90df22d4ab", + "uuid": "f34361c4-96f1-47c2-8e12-2a21fda6f66a", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -23513,7 +23605,7 @@ ] }, { - "uuid": "2ecc6711-777e-411c-92f8-ea7775e14630", + "uuid": "c70066ca-9bcb-42eb-b9b0-86a847932a98", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23540,7 +23632,7 @@ ] }, { - "uuid": "735b591a-35d6-4e3b-9d01-e639103ec984", + "uuid": "632a54ad-707e-4337-b23c-7fbc66a8e30f", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23567,7 +23659,7 @@ ] }, { - "uuid": "1f573e3b-17c4-4223-9161-eebf7e86377d", + "uuid": "64253d52-f2c8-43f0-94d4-3b8b90aab629", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23609,7 +23701,7 @@ ] }, { - "uuid": "d1fd6c0d-03df-4fd1-bcd2-541f7d26514f", + "uuid": "5c4ebe4a-8be2-4bab-8ffd-052ec312f0ad", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23631,7 +23723,7 @@ ] }, { - "uuid": "f37a1903-2918-4ea1-86f9-b6461bc244da", + "uuid": "b07f5059-4101-4bd5-912d-f6f0b62cb654", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23653,7 +23745,7 @@ ] }, { - "uuid": "97731195-1741-46ea-9230-abeffebd7486", + "uuid": "92f46be9-ce20-465d-92ad-29fa6728d485", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -23666,7 +23758,7 @@ ] }, { - "uuid": "024353ca-6f60-4cea-b5e5-d509137a22d1", + "uuid": "9199c919-ed8e-4f16-9e91-53a65758c22f", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23683,7 +23775,7 @@ ] }, { - "uuid": "97550377-546f-4e2d-a89e-59cc14b172b6", + "uuid": "89b9ec98-3cf0-46f2-9a9e-9d024e576723", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23700,7 +23792,7 @@ ] }, { - "uuid": "4fb0dde9-8331-492f-bb6b-f7b8dc1c5a2e", + "uuid": "a6b1156a-9876-458d-a45f-3ad5b7524f4b", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23717,7 +23809,7 @@ ] }, { - "uuid": "be1c42ee-98b1-458f-ac70-ff9fff0ab264", + "uuid": "5b8b190c-aa8c-4534-a36a-fb3d64b87cc9", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23734,7 +23826,7 @@ ] }, { - "uuid": "c47cb53f-ea7f-487f-b1e1-edb7571d4692", + "uuid": "2697dd56-7e30-4f40-9491-06842669f48f", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23751,7 +23843,7 @@ ] }, { - "uuid": "a5072556-2efc-4f52-8bfc-96a8e324ef0d", + "uuid": "da717276-adac-4589-8a47-e9c6f5f34592", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23768,7 +23860,7 @@ ] }, { - "uuid": "f76372c8-d041-4839-86c4-b6c7901f9d43", + "uuid": "feaee39d-da23-48d7-9f79-c8bba30db4f0", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23785,7 +23877,7 @@ ] }, { - "uuid": "eef7f5d1-ee79-4c43-93d2-28f8bffa02a7", + "uuid": "e6309105-9284-4975-87a0-238adbdbee5d", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23812,7 +23904,7 @@ ] }, { - "uuid": "2ae5cc3b-19f9-4480-8c2c-73d18ad09a88", + "uuid": "334bf7cb-0f7e-49ea-94b1-c3f7ce17973f", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json index a8bb40e1e..e90307ed3 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "e4c9973a-dbda-48c4-8081-bf2dbfe65692", "metadata": { "title": "Component definition for fedora", - "last-modified": "2026-02-12T10:38:05.329597+00:00", - "version": "1.8", + "last-modified": "2026-03-27T01:43:37.376718+00:00", + "version": "1.9", "oscal-version": "1.1.3" }, "components": [ @@ -47,103 +47,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -155,67 +155,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -227,13 +227,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -245,13 +245,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -263,31 +263,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -299,49 +299,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -353,13 +353,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -371,31 +371,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -407,13 +407,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -425,13 +425,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -443,13 +443,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -461,13 +461,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -479,13 +479,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -497,13 +497,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -515,265 +515,265 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -785,234 +785,252 @@ { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_postfix_inet_interfaces", + "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for inet_interfaces in /etc/postfix/main.cf", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", + "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_screensaver_lock_delay", + "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", + "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", + "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_policy_name", + "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", + "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_max_sessions", + "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of open sessions permitted.", + "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", + "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_keepalive", + "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of idle message counts before session is terminated.", + "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", + "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_login_grace_time", + "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", + "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 60, 60: 60}", + "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_maxstartups", + "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", + "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", + "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sudo_timestamp_timeout", + "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", + "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_user_initialization_files_regex", + "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_user_initialization_files_regex", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" }, @@ -1331,3463 +1349,3475 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_mcstrans_removed", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "banner_etc_issue_cis", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_owner_etc_motd", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_permissions_etc_motd", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_owner_etc_issue", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "file_permissions_etc_issue", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_kea_removed", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall kea Package", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_bind_removed", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall bind Package", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "package_dnsmasq_removed", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "service_nfs_disabled", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_rsync_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall rsync Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_samba_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall Samba Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_net-snmp_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "package_squid_removed", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Uninstall squid Package", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_httpd_removed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_nginx_removed", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Uninstall nginx Package", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_ftp_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Remove ftp Package", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet_removed", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Remove telnet Clients", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "package_tftp_removed", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Remove tftp Daemon", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "package_cron_installed", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "service_crond_enabled", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Enable cron Service", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_groupowner_crontab", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_owner_crontab", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Owner on crontab", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_permissions_crontab", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Permissions on crontab", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_owner_cron_hourly", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", + "value": "file_owner_cron_daily", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.weekly", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_weekly", + "value": "file_owner_cron_weekly", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.weekly", + "value": "Verify Owner on cron.weekly", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_monthly", + "value": "file_permissions_cron_weekly", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.monthly", + "value": "Verify Permissions on cron.weekly", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_monthly", + "value": "file_groupowner_cron_monthly", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.monthly", + "value": "Verify Group Who Owns cron.monthly", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_monthly", + "value": "file_owner_cron_monthly", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.monthly", + "value": "Verify Owner on cron.monthly", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_yearly", + "value": "file_permissions_cron_monthly", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.yearly", + "value": "Verify Permissions on cron.monthly", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_yearly", + "value": "file_groupowner_cron_yearly", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.yearly", + "value": "Verify Group Who Owns cron.yearly", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_yearly", + "value": "file_owner_cron_yearly", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.yearly", + "value": "Verify Owner on cron.yearly", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_d", + "value": "file_permissions_cron_yearly", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.d", + "value": "Verify Permissions on cron.yearly", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_d", + "value": "file_groupowner_cron_d", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.d", + "value": "Verify Group Who Owns cron.d", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_d", + "value": "file_owner_cron_d", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.d", + "value": "Verify Owner on cron.d", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_deny_not_exist", + "value": "file_permissions_cron_d", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.deny does not exist", + "value": "Verify Permissions on cron.d", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_allow_exists", + "value": "file_cron_deny_not_exist", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.allow exists", + "value": "Ensure that /etc/cron.deny does not exist", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_allow", + "value": "file_cron_allow_exists", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/cron.allow file", + "value": "Ensure that /etc/cron.allow exists", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_allow", + "value": "file_groupowner_cron_allow", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/cron.allow file", + "value": "Verify Group Who Owns /etc/cron.allow file", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_allow", + "value": "file_owner_cron_allow", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/cron.allow file", + "value": "Verify User Who Owns /etc/cron.allow file", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_deny_not_exist", + "value": "file_permissions_cron_allow", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.deny does not exist", + "value": "Verify Permissions on /etc/cron.allow file", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_allow_exists", + "value": "file_at_deny_not_exist", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.allow exists", + "value": "Ensure that /etc/at.deny does not exist", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_at_allow", + "value": "file_at_allow_exists", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/at.allow file", + "value": "Ensure that /etc/at.allow exists", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_at_allow", + "value": "file_groupowner_at_allow", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/at.allow file", + "value": "Verify Group Who Owns /etc/at.allow file", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_at_allow", + "value": "file_owner_at_allow", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/at.allow file", + "value": "Verify User Who Owns /etc/at.allow file", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_atm_disabled", + "value": "file_permissions_at_allow", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ATM Support", + "value": "Verify Permissions on /etc/at.allow file", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_can_disabled", + "value": "kernel_module_atm_disabled", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable CAN Support", + "value": "Disable ATM Support", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_dccp_disabled", + "value": "kernel_module_can_disabled", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable DCCP Support", + "value": "Disable CAN Support", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_tipc_disabled", + "value": "kernel_module_dccp_disabled", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable TIPC Support", + "value": "Disable DCCP Support", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_rds_disabled", + "value": "kernel_module_tipc_disabled", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable RDS Support", + "value": "Disable TIPC Support", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_forward", + "value": "kernel_module_rds_disabled", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", + "value": "Disable RDS Support", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_forwarding", + "value": "sysctl_net_ipv4_ip_forward", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding", + "value": "sysctl_net_ipv4_conf_all_forwarding", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", + "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_conf_default_forwarding", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_143" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "remarks": "rule_set_144" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "remarks": "rule_set_144" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_314" + "remarks": "rule_set_315" } ], "control-implementations": [ { - "uuid": "1729e45a-2bdc-42af-984f-eee12bb7802b", + "uuid": "75d8abf5-4996-4680-ac8c-2106c119cd4b", "source": "trestle://profiles/fedora-cis_fedora-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -4805,17 +4835,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -5131,7 +5167,7 @@ ], "implemented-requirements": [ { - "uuid": "ab1a627a-67bc-415c-8867-f3396f3a6b9d", + "uuid": "4479ef8a-5d35-4e46-b41a-3408c5dc1a29", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5148,7 +5184,7 @@ ] }, { - "uuid": "5e51be0c-4f25-45a2-8948-fc413596b3cd", + "uuid": "5bcbdb87-5b05-49b2-a946-141ee8524c2c", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5165,7 +5201,7 @@ ] }, { - "uuid": "05cd0898-f1fd-4da9-93fa-13ff65b78558", + "uuid": "6b365f9c-a72b-4db5-93a6-ae78475ffb52", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5182,7 +5218,7 @@ ] }, { - "uuid": "4fa2f746-f83c-4057-a96a-f3f193bcf087", + "uuid": "06249c47-e42a-47d3-8172-9cb04c816212", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5199,7 +5235,7 @@ ] }, { - "uuid": "9c29dbbc-ff0a-4fd4-8c32-1e0222466a10", + "uuid": "6da6d5eb-b500-49a2-abce-aa70f71ccfef", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5216,7 +5252,7 @@ ] }, { - "uuid": "26223847-3620-447a-bb45-fffc4b4fa2bb", + "uuid": "988fb113-0dc8-43cc-b5c6-57636b0204fc", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5233,7 +5269,7 @@ ] }, { - "uuid": "242750d0-360c-404b-a8cf-ef6cc3489095", + "uuid": "c5c58d7b-388a-426c-82b6-dfd1608def4b", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -5246,7 +5282,7 @@ ] }, { - "uuid": "2c226904-0534-4c88-9b4c-869b288ebf04", + "uuid": "57de1c20-4f0d-42ad-9c58-a86e655f0216", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5263,7 +5299,7 @@ ] }, { - "uuid": "74b0db68-bcd5-4f2a-94d7-f6bad5ae59f7", + "uuid": "8c198558-416f-4e05-a8d0-7f3a4cd81017", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5280,7 +5316,7 @@ ] }, { - "uuid": "b8cca9f5-3645-4691-a970-0f6d5fc944e8", + "uuid": "81b46d58-9649-4725-a867-e7b71b92b623", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5297,7 +5333,7 @@ ] }, { - "uuid": "9208c87d-b898-4555-9073-f3c7e4a1d8e3", + "uuid": "e684d2c4-335b-4fa0-a98f-40d67f24c880", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5314,7 +5350,7 @@ ] }, { - "uuid": "eec6f45f-73ce-4398-be78-84ab8679d26a", + "uuid": "d7d2717c-a98f-4e56-9bb4-6329a39bfd1c", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5331,7 +5367,7 @@ ] }, { - "uuid": "e2b817d0-a8bf-4524-a9bf-8004c8f43ee8", + "uuid": "4eb56788-09b0-4742-a6b5-02f3421add34", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5348,7 +5384,7 @@ ] }, { - "uuid": "e93d435a-f6e7-4b1d-b943-b0d8bd50e7a5", + "uuid": "943c09cd-05f9-4297-b00c-acdfab797119", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5365,7 +5401,7 @@ ] }, { - "uuid": "42676b9b-6533-4d5a-bff1-25efed0e5ff9", + "uuid": "87f8dfd9-a76c-4620-ba3e-d06e9c0e018e", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5382,7 +5418,7 @@ ] }, { - "uuid": "74384e4a-2ff3-4fd0-8938-3e382ff2e75f", + "uuid": "7ddffed9-a1eb-499b-bd46-b7d9ceb2feaf", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5399,7 +5435,7 @@ ] }, { - "uuid": "92152183-3084-4b78-9699-78bc87526f5d", + "uuid": "f545d3e2-d065-4912-9b19-7d8d7356985a", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5416,7 +5452,7 @@ ] }, { - "uuid": "6bef8386-a70c-408d-8ebd-5966ab23923d", + "uuid": "656f2998-2306-48e5-925d-87b2023ddd7a", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5433,7 +5469,7 @@ ] }, { - "uuid": "2a4d0adc-5805-4b7b-8f95-4e9040172919", + "uuid": "f92e37eb-21b2-4ba5-8b51-4d1f2cd6a2b6", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5450,7 +5486,7 @@ ] }, { - "uuid": "00d49769-f720-43d2-b2d7-d706ee00dab6", + "uuid": "bebf0ced-cb7b-4281-9fa3-18fdf5268684", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5467,7 +5503,7 @@ ] }, { - "uuid": "b3770d05-9616-4adf-8e10-e5a9a07e3601", + "uuid": "13ca7b76-e7fd-4c35-aa5d-ebc2b5a9c943", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5484,7 +5520,7 @@ ] }, { - "uuid": "8310309c-4873-4458-89ba-045bbc427e76", + "uuid": "c7327d9b-ca8b-4847-a332-75297cfe8f1f", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5501,7 +5537,7 @@ ] }, { - "uuid": "45127dfe-506d-40f3-85f5-90abb1800280", + "uuid": "cf5678a9-1873-417f-bb28-e048286f6888", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5518,7 +5554,7 @@ ] }, { - "uuid": "0c53657c-2ef5-47e3-8570-c17c7d9f5c5c", + "uuid": "09e0178f-920c-4c32-a998-36e0a671d2e3", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5535,7 +5571,7 @@ ] }, { - "uuid": "8ffb0b3f-3e4c-40a7-ad25-57e25418dc5e", + "uuid": "b4678781-9021-42e7-a4b2-50c0609b2a15", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5552,7 +5588,7 @@ ] }, { - "uuid": "90e42e63-9917-4f73-98f0-e09dfe9514b3", + "uuid": "ac75a983-cb99-4362-b164-0cdadde973ec", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5569,7 +5605,7 @@ ] }, { - "uuid": "f6c5be6c-67c1-4769-b9ea-81887259265a", + "uuid": "bb429b49-7f88-496f-94f3-fabc55e30861", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5586,7 +5622,7 @@ ] }, { - "uuid": "e7ad0fce-b66c-4769-ad15-01325966dc98", + "uuid": "3d22f1c1-3637-49fd-a3aa-572507b3bbea", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5603,20 +5639,24 @@ ] }, { - "uuid": "e3e9d35a-5b11-4108-80ef-b6872cda90f8", + "uuid": "68703836-b637-41b8-a591-b92d48ee8e63", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "c06bb64d-cb16-4876-b4fd-353e6b0410dc", + "uuid": "4b781210-dd21-4544-987b-6b5aa1d2d5ae", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5633,7 +5673,7 @@ ] }, { - "uuid": "ac80d92a-d6cb-4f43-aba0-33b0f650c1b6", + "uuid": "139ed845-5daf-4044-a980-c3d7693fa353", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -5646,7 +5686,7 @@ ] }, { - "uuid": "2866ba9b-4e11-4594-83c1-0c5ff8df088d", + "uuid": "7599df0b-d6a2-430a-a106-19d329fc81af", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -5659,7 +5699,7 @@ ] }, { - "uuid": "cf65a8b3-bfe5-4c28-89c1-1ff92cabc928", + "uuid": "70250c3c-e8a6-4aa5-b327-8857d3592414", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5676,7 +5716,7 @@ ] }, { - "uuid": "83b90d62-937a-4fd4-9ce8-0d24ddf7607f", + "uuid": "dac31ad3-0b57-437d-8945-cd83a73d32a2", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5693,7 +5733,7 @@ ] }, { - "uuid": "243bd7e9-43d8-419b-93e3-508b1b4591d2", + "uuid": "a5155157-7e77-4d11-89cc-d981d6c568f3", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5710,7 +5750,7 @@ ] }, { - "uuid": "d121a3d9-cb60-4aa7-a1aa-96817df5c67b", + "uuid": "893a7528-63cb-447c-a3dc-98e4be48fc09", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5727,7 +5767,7 @@ ] }, { - "uuid": "5d4408b4-8ce1-4038-8aae-53847b071adb", + "uuid": "76e5accb-dfe7-429a-bcec-c55b361c7efa", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5744,7 +5784,7 @@ ] }, { - "uuid": "4f3e10af-48d7-4dca-b294-b24c4c6cc41e", + "uuid": "02e3bcfe-0dc3-4d44-a310-a2e00b0004bd", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5761,7 +5801,7 @@ ] }, { - "uuid": "1725f308-1190-48bb-bcd9-0d72f6178813", + "uuid": "daa9ccc0-4819-4daf-abcd-bc2123471960", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -5788,7 +5828,7 @@ ] }, { - "uuid": "28efba55-429c-490a-8650-ff72faa7e061", + "uuid": "8c2964ce-1177-44a2-a5f0-7157586a3fac", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -5805,7 +5845,7 @@ ] }, { - "uuid": "9811ea85-a719-4cfe-9a42-dbcb9a0cdcb0", + "uuid": "4eea48ab-3a5b-4b86-b85c-b773b8b57910", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -5822,7 +5862,7 @@ ] }, { - "uuid": "eabc284b-6f42-449f-9804-7910a504a8a6", + "uuid": "d84c523f-34cb-40ff-b028-8cb4cc475863", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -5839,7 +5879,7 @@ ] }, { - "uuid": "cd0fbb90-17e7-4439-a229-c5d1361c7053", + "uuid": "0e5a4a81-d2f5-46b7-a810-a2b2293bbad8", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -5856,7 +5896,7 @@ ] }, { - "uuid": "beb1d1db-c434-4feb-a78e-9fea7d6bd558", + "uuid": "13f61abe-fed4-4196-9359-39e9958e2a5b", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -5873,7 +5913,7 @@ ] }, { - "uuid": "6534bcea-828c-4289-85d7-2f83a8ddd76d", + "uuid": "eac0fee7-6717-43c5-8066-3c8ed5eeb0c1", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -5890,7 +5930,7 @@ ] }, { - "uuid": "1057b1f7-c0e9-4a16-a1d5-cc9f7812cb30", + "uuid": "6f2e7ede-10a5-4be5-b2ef-e9421be69ebd", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -5907,7 +5947,7 @@ ] }, { - "uuid": "c241bbee-0ee8-40aa-acc9-f327141d2b54", + "uuid": "a54dad31-4596-4193-9a89-b2422a4a6eef", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -5924,7 +5964,7 @@ ] }, { - "uuid": "7a875b44-53ba-461b-9abc-adac143b85e6", + "uuid": "0e2e6684-9337-4088-b10e-bcec22e3c5a0", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -5941,7 +5981,7 @@ ] }, { - "uuid": "39bb484a-4b93-4375-84d4-f42b180ade8e", + "uuid": "7c0da8e7-8ac8-4898-9861-f2410e2f16cf", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -5958,7 +5998,7 @@ ] }, { - "uuid": "d77694f4-868d-4a80-a3da-c23e316cc3e8", + "uuid": "9b626f60-d213-44f7-b3a1-91b5f2ee4999", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -5975,7 +6015,7 @@ ] }, { - "uuid": "8898ef43-632e-41bd-81cb-125981fc922d", + "uuid": "be03f1c7-b43a-4b3c-bb00-dc90f5513abd", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -5992,7 +6032,7 @@ ] }, { - "uuid": "eef07de8-188d-4d2d-894b-e9f8c69e6586", + "uuid": "ee0d7f62-99dc-4bf7-b64e-c1bef04c0760", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6009,7 +6049,7 @@ ] }, { - "uuid": "3faf6b6b-ee0c-4a98-beb8-87ffe44f3528", + "uuid": "7d700ba5-31a6-4797-95c9-b8580e8a4170", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6026,7 +6066,7 @@ ] }, { - "uuid": "d5c7101c-13f3-4bd5-98e2-8961319cbee9", + "uuid": "5e587e76-feea-4758-b67c-b4ff4878087c", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6043,7 +6083,7 @@ ] }, { - "uuid": "ad399f94-16ea-47b5-a7ca-26d3a6b537a5", + "uuid": "8b400d17-7e15-4656-9822-7202227eda21", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6060,7 +6100,7 @@ ] }, { - "uuid": "acc9b99e-5bc7-4029-873b-d8d048438918", + "uuid": "6f16cc36-4f4e-4424-a405-987cc89b17e1", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6077,7 +6117,7 @@ ] }, { - "uuid": "5752980f-1c9c-46e9-9278-c3aae9399864", + "uuid": "af7bc9df-39e5-4692-85f7-10b7151fc49a", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6104,7 +6144,7 @@ ] }, { - "uuid": "152203ac-bf74-4270-9c5b-0f17beb0903f", + "uuid": "5b3026a4-ef4b-4419-9cef-d92f958492ee", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6131,7 +6171,7 @@ ] }, { - "uuid": "6ba2ee53-ead5-48f6-9cc6-6205f729276c", + "uuid": "cce6aba6-fe28-403d-b78f-aaa60ffe4795", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6158,7 +6198,7 @@ ] }, { - "uuid": "91e3ac33-545d-4b7b-967b-8b5df44727cf", + "uuid": "7b0a5fa2-02ff-4463-8564-ddb9fe81a757", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6180,7 +6220,7 @@ ] }, { - "uuid": "2173a913-9d2c-44e8-a206-12fd71029877", + "uuid": "e5d11a62-716f-4f7b-b5e8-e56e037baaaf", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -6197,7 +6237,7 @@ ] }, { - "uuid": "bdb7b748-51a1-4853-87ac-9e860f204df3", + "uuid": "5e791c83-523d-4883-b9b8-5a56ad5fc1c5", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6229,7 +6269,7 @@ ] }, { - "uuid": "63679909-5165-411c-bf18-05f26cd67301", + "uuid": "55577392-d1b4-48fb-bc3f-cba390a14a90", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6246,7 +6286,7 @@ ] }, { - "uuid": "8b06802e-2d1f-49ef-b281-8f9b8fd3e32d", + "uuid": "526c457d-98ff-4c9e-a9c9-91e19e348531", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -6259,7 +6299,7 @@ ] }, { - "uuid": "2003df18-465c-489d-ba73-733331573382", + "uuid": "fe262743-9f54-4d8e-b941-e45a8d93e69d", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6276,7 +6316,7 @@ ] }, { - "uuid": "fa636b64-752b-4584-b83f-75e3b66e210e", + "uuid": "de936cf0-d927-45fd-9afa-eb425335c6e1", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6293,7 +6333,7 @@ ] }, { - "uuid": "d25ed248-8561-411e-b7e4-f06dfc2514e8", + "uuid": "ec4d704d-ba7b-4bad-8c65-2e80916e1976", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6310,7 +6350,7 @@ ] }, { - "uuid": "e8b40c1f-b711-45de-bc07-994e6128637f", + "uuid": "d9f6b37e-2098-40f9-9e29-dfd92c677b7f", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6327,7 +6367,7 @@ ] }, { - "uuid": "3fb99454-396c-4dd3-ba74-f147208e7665", + "uuid": "7f227a35-3fff-4025-9834-abd42a1b8c45", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6349,7 +6389,7 @@ ] }, { - "uuid": "c86249ee-70f2-4197-a7cb-fd20b97c0806", + "uuid": "73566d4e-1c54-4c82-a556-1cb129ec7348", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6366,7 +6406,7 @@ ] }, { - "uuid": "c19e54ff-e5c1-4038-b3f2-031029766ad6", + "uuid": "23f8ec4c-8fe8-4ffc-9b54-8cd7afea352a", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -6378,7 +6418,7 @@ ] }, { - "uuid": "ffecc48d-b72c-43bd-a603-8728ea7f70c7", + "uuid": "50ce02b7-cd4b-473d-a02f-315b83676442", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6395,7 +6435,7 @@ ] }, { - "uuid": "750b987e-9a62-427c-ba08-814b6520f28b", + "uuid": "84c2d271-37e2-40b9-931b-8c24d8936302", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6412,7 +6452,7 @@ ] }, { - "uuid": "de73cea1-a236-4acf-a4ab-d7fad0f7cb10", + "uuid": "0694cd2c-2a1c-4929-8af3-81e0703bbe03", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6429,7 +6469,7 @@ ] }, { - "uuid": "fe97a79d-2d3f-4700-85d7-59fae5ae4b67", + "uuid": "2744b681-9524-448e-9738-be43b02d24b3", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6446,7 +6486,7 @@ ] }, { - "uuid": "0fd1250a-5a3e-4970-87e2-316a2a3962c2", + "uuid": "4e30e0b5-bf9b-40b7-beb1-80fcf4b1a802", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6463,7 +6503,7 @@ ] }, { - "uuid": "e1ffa92e-b5c0-43c6-93a2-4447e5d4241a", + "uuid": "dcffccd7-16d0-4843-adc4-3167e33ac33c", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6480,7 +6520,7 @@ ] }, { - "uuid": "e6784033-cdf9-4ab7-8a4d-3adeca6ce875", + "uuid": "1ef132e3-c3b7-42c5-8251-28ddf1ab9d9a", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6497,7 +6537,7 @@ ] }, { - "uuid": "36e686c8-09aa-439b-8685-addc75d3a724", + "uuid": "65ae6f8d-ee20-46ae-9b72-f5fd45844237", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -6519,7 +6559,7 @@ ] }, { - "uuid": "6cef5493-4e47-4929-b4ec-75c1d4c9a04a", + "uuid": "6b10e31d-f729-46ed-9abc-684577942285", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -6532,7 +6572,7 @@ ] }, { - "uuid": "53bc94a0-8319-4507-807a-6ce33875becf", + "uuid": "f6b124eb-bda9-4710-9b29-aba1bcad0996", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -6554,7 +6594,7 @@ ] }, { - "uuid": "0d4d5cc8-fdec-4284-9321-cba38e25e6f6", + "uuid": "dfad42a1-17b5-4140-915c-3e36695f1d2e", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -6567,7 +6607,7 @@ ] }, { - "uuid": "c876a6a3-0947-4875-bf20-a457cddf70ec", + "uuid": "ffe8a71b-b5ad-48a8-bf6c-38a8c5f733c1", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6584,7 +6624,7 @@ ] }, { - "uuid": "dd2c0120-5683-4e5f-af73-ca9fdbf1d0a1", + "uuid": "6c607151-c21b-41c3-a1a2-21a39863f17f", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6596,7 +6636,7 @@ ] }, { - "uuid": "4705045b-d575-4773-8688-9789f977952a", + "uuid": "e75b251c-593e-4650-a9bc-6c0cfe98ba67", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6613,7 +6653,7 @@ ] }, { - "uuid": "98d1d327-b3b0-4f52-9ef8-d2e4bae8627f", + "uuid": "effa4a7c-4b5f-4f08-b2a6-9a72d863b92e", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -6630,7 +6670,7 @@ ] }, { - "uuid": "931d3901-3002-422c-9929-c902c51b2ea7", + "uuid": "0c70483f-3d7a-4008-b295-0280dc1873b1", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6642,7 +6682,7 @@ ] }, { - "uuid": "3f9b4d2e-ee34-4155-89a4-2c2a9335b4ca", + "uuid": "485f5f6b-15c2-46e4-bee1-c5102e5ba0dc", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6659,7 +6699,7 @@ ] }, { - "uuid": "6d7f7e07-9af5-4b1e-abe0-7feb5463fc6a", + "uuid": "e249537d-94be-409c-9baf-0a36487a3fdf", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6676,7 +6716,7 @@ ] }, { - "uuid": "e34a76fa-b146-4ea7-9e11-608947da493e", + "uuid": "e9ebf400-95e6-468c-87e6-44b07641587b", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6698,7 +6738,7 @@ ] }, { - "uuid": "a47834f6-ff73-4998-ad69-34c18471851c", + "uuid": "a161a4ee-1e8b-45c0-8ca6-0e538f7a27d6", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6725,7 +6765,7 @@ ] }, { - "uuid": "019ce04a-07dc-4988-b2bf-466e0284a564", + "uuid": "74078279-3f30-446d-8ff6-52605ea7b433", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6752,7 +6792,7 @@ ] }, { - "uuid": "3c2c69a3-a6af-4542-926f-ec0d02b7855a", + "uuid": "630e90d8-db9e-4acc-9d46-f03a2edb1750", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6779,7 +6819,7 @@ ] }, { - "uuid": "549c3f43-103b-4110-85f4-bb2510e0cce0", + "uuid": "d7dc883c-cc4d-4b85-8427-dd7b4ac0c60d", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -6806,7 +6846,7 @@ ] }, { - "uuid": "b50c463d-4626-418e-b6cc-67f3fb2be4e7", + "uuid": "879e4fd0-5fb3-41a1-85ec-40010c6efd27", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -6833,7 +6873,7 @@ ] }, { - "uuid": "f829d68e-164b-48ee-98c7-c8d056663131", + "uuid": "ccd59635-5769-48c8-90dc-2a2138427bbc", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -6860,7 +6900,7 @@ ] }, { - "uuid": "ed029167-602e-4f40-953a-6607fedb8259", + "uuid": "0ba50384-2130-407c-a595-ca483c0eebaa", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -6887,7 +6927,7 @@ ] }, { - "uuid": "d7bd0086-5f92-4b16-a8ad-b74edf9ddc95", + "uuid": "8f4ed250-8d01-4354-9725-05773265702d", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -6924,7 +6964,7 @@ ] }, { - "uuid": "7d291888-4e51-4502-8dfe-92061b7a0755", + "uuid": "99af594e-8596-4f3a-b986-827013b548f0", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -6961,7 +7001,7 @@ ] }, { - "uuid": "d29cb175-18ec-44b7-bc6f-ed82ade46788", + "uuid": "605fb6c5-7b9a-4807-9d5d-64a8675b2ec8", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -6974,7 +7014,7 @@ ] }, { - "uuid": "f4837d5f-9cb7-44df-9e8f-e119c9fe2efd", + "uuid": "fd0a6be2-662a-4c32-9ed1-ee287fe2f8ad", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -6991,7 +7031,7 @@ ] }, { - "uuid": "7d8f02da-676e-430b-a4d3-a6d10b1ce217", + "uuid": "e76c0d8b-2738-493d-af68-a95712c217b1", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7008,7 +7048,7 @@ ] }, { - "uuid": "83422878-023a-4a6f-8d2b-e1665c4321c6", + "uuid": "27ac006c-ae5a-4668-8764-7d57ecedd38e", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7025,7 +7065,7 @@ ] }, { - "uuid": "e7039b19-3f2b-439b-add1-c82622dd84f0", + "uuid": "1d7662f3-5ed4-4d24-bbef-0ca0bf1f5722", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7042,7 +7082,7 @@ ] }, { - "uuid": "eafaa917-3818-4657-bea6-ba8d70e436bb", + "uuid": "bf0bf279-03d4-4fb5-bb60-11b4e0d7f14b", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7059,7 +7099,7 @@ ] }, { - "uuid": "235c8db4-7b4d-43be-847c-33fc820a468a", + "uuid": "bae7376d-b662-4f8f-93b8-0ca6112cb625", "control-id": "cis_fedora_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7076,7 +7116,7 @@ ] }, { - "uuid": "23383127-c9ee-4e5e-931f-e867bd18f2a4", + "uuid": "ef652c09-a811-4509-b66b-a9e7bbb680c0", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7093,7 +7133,7 @@ ] }, { - "uuid": "3de73f40-c347-4a0d-9f69-4da4bbe4124d", + "uuid": "59ec41ba-f2da-4e03-9306-499bf840051d", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7110,7 +7150,7 @@ ] }, { - "uuid": "a7113e19-1d90-492c-a1c7-88533454a222", + "uuid": "0712e3e9-862d-4efd-950d-cb78dde60796", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7127,7 +7167,7 @@ ] }, { - "uuid": "e6c6a662-e593-4327-911a-85ec4409b8a3", + "uuid": "d4e4e89f-119c-4f98-a2ae-11d5c8393ab1", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7144,7 +7184,7 @@ ] }, { - "uuid": "ec5b1eb9-c44f-410e-b05b-7763f3920ef2", + "uuid": "51886ce8-49d3-48e7-88cd-3c5ee43c2f0b", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7161,7 +7201,7 @@ ] }, { - "uuid": "ca75e61c-b308-49a1-82c1-5716343486b7", + "uuid": "23439b7e-b747-4269-bc87-68956e500f65", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7178,7 +7218,7 @@ ] }, { - "uuid": "b2a1eefa-e395-4a73-917f-49da746fc3d9", + "uuid": "04eb4f4d-7c3b-4b31-8229-da923898641d", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7195,7 +7235,7 @@ ] }, { - "uuid": "fde5d502-7107-44c8-965f-15a392f87caf", + "uuid": "b5bf6ba7-2e57-4824-84f1-d0bf655f36d4", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7212,7 +7252,7 @@ ] }, { - "uuid": "563c55c2-0cb8-4d65-b097-41dea4c995c1", + "uuid": "fa6305af-7575-4a01-93dc-beb8f2f4302c", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7229,7 +7269,7 @@ ] }, { - "uuid": "cd27b5a8-4e5e-4ffd-ab89-04b845740999", + "uuid": "b2df6f34-5a74-4906-b06c-298abca56791", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7246,7 +7286,7 @@ ] }, { - "uuid": "15143214-0a72-4c6d-aaba-147b1234b66b", + "uuid": "9f1f9168-2fa4-40b0-a21d-f44bd182bb70", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7263,7 +7303,7 @@ ] }, { - "uuid": "d6145f8c-0294-4e80-aef1-4b4d04bb1d4b", + "uuid": "efc4d9d2-3341-4f86-a4b2-bc50b3cd04e8", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7280,7 +7320,7 @@ ] }, { - "uuid": "5a12d363-e4c9-4189-97ab-dcaadd13425e", + "uuid": "11273c8c-9e50-4ca4-830b-261388144d28", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7297,7 +7337,7 @@ ] }, { - "uuid": "188c8206-c0c0-4db2-9327-a276c4e8a017", + "uuid": "9cbea043-2934-4ebf-be1a-e0c94b91b43b", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7314,7 +7354,7 @@ ] }, { - "uuid": "20e13026-731c-4b48-b2ba-a692ea839ec6", + "uuid": "1a21655d-f1b9-412e-9459-c535559bdcff", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7331,7 +7371,7 @@ ] }, { - "uuid": "e6b82615-5c50-481e-912b-c03c57bf1b24", + "uuid": "5ed63a5e-fc31-4756-8f77-30e56f6f1474", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7348,7 +7388,7 @@ ] }, { - "uuid": "d0ec4629-69bc-4534-9bbd-788327190904", + "uuid": "3dfbcc6a-fce5-4785-9c4a-5a83d34f411b", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7365,7 +7405,7 @@ ] }, { - "uuid": "10102d86-22f7-4015-a997-e2a72c1f56fd", + "uuid": "c0d54943-577e-4ca5-a147-718df90b3f8e", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7382,7 +7422,7 @@ ] }, { - "uuid": "570ca2a5-b010-4ea8-8c0f-86a60e01b34a", + "uuid": "2a010ff5-aedf-434e-a534-57106373f960", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7399,7 +7439,7 @@ ] }, { - "uuid": "b709f0c7-674a-4e65-83b0-959531a7df00", + "uuid": "6c4daa6f-0e92-47bc-bdce-50a4e7beb464", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7416,7 +7456,7 @@ ] }, { - "uuid": "b6f32735-8e5e-47ec-a507-f4cb9253f779", + "uuid": "21836510-29d2-4e06-bc3e-575ee55de68c", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7433,7 +7473,7 @@ ] }, { - "uuid": "ce79d6c3-e883-4763-81f3-a284717be45d", + "uuid": "d6022751-2a28-42e6-9fd7-943cae96dcf0", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7450,7 +7490,7 @@ ] }, { - "uuid": "8b7f662e-ec5d-4143-89da-463f7020007d", + "uuid": "ec5ee209-55a1-4bf1-b54b-2798d1332485", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7467,7 +7507,7 @@ ] }, { - "uuid": "3053a293-e7b1-44f2-9f13-e661cf6d99e7", + "uuid": "ed274c83-1149-4d0f-bdb7-a4461ebcfc93", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7484,7 +7524,7 @@ ] }, { - "uuid": "4e93617f-41f7-4c24-9537-61458c9dea8b", + "uuid": "21186c5f-15b7-424b-a5f2-d0ace4e66442", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7501,7 +7541,7 @@ ] }, { - "uuid": "96261886-46e8-4624-9b48-5e5a6aed7559", + "uuid": "17a7bdfa-0b20-4548-8270-54e9c0276bcb", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7518,7 +7558,7 @@ ] }, { - "uuid": "8de81f47-43f9-4f74-abcb-3f027022145b", + "uuid": "e22baf25-7bea-4120-b0c5-a21bdcdaa434", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7545,7 +7585,7 @@ ] }, { - "uuid": "a95086b2-120a-4542-aba7-ef4e4145c8d1", + "uuid": "8479960b-b2de-470d-9cfa-7c68e7c990f1", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -7558,7 +7598,7 @@ ] }, { - "uuid": "5f0b8d81-f50f-48e7-9c85-b1b12f29679d", + "uuid": "6086f173-b41c-4cb0-9274-a7346556008d", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -7580,7 +7620,7 @@ ] }, { - "uuid": "da5b5639-6486-49cb-b7b3-f51819ee63c9", + "uuid": "fa655e57-db3d-4413-9baf-200d20bd8961", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -7592,7 +7632,7 @@ ] }, { - "uuid": "cca781e5-4ab6-40cb-b97a-5c176fba462e", + "uuid": "1f5acfc8-2fd2-4cc6-bed9-4be7272d933b", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -7605,7 +7645,7 @@ ] }, { - "uuid": "7bac6856-0a0e-41e9-bb26-2a0e6856c72f", + "uuid": "88690520-cba1-4de9-bcba-f673450f7b4e", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -7617,7 +7657,7 @@ ] }, { - "uuid": "f2f4af44-4e34-4f28-9666-232321ffe40b", + "uuid": "315655dc-5423-4b8c-b93f-9249feb7f556", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -7629,7 +7669,7 @@ ] }, { - "uuid": "c2e0fc18-06ab-4377-b64f-c836cc41d705", + "uuid": "cd098348-4745-4f9b-b593-58fae4587c0f", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7686,7 +7726,7 @@ ] }, { - "uuid": "d7df8f10-5714-4e18-9c79-08f422619145", + "uuid": "a68c277a-68ac-42ef-ac5f-990e08e48a90", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7713,7 +7753,7 @@ ] }, { - "uuid": "2f4480be-384d-436a-980f-279862a73d00", + "uuid": "9887ce73-12af-47c8-a7b0-8d14b1f98ee1", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7740,7 +7780,7 @@ ] }, { - "uuid": "02c778fc-4c6b-4e56-a5ae-b3ab0dfbac60", + "uuid": "9844c514-879b-48ee-b39d-19578ca173c0", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7757,7 +7797,7 @@ ] }, { - "uuid": "cab27307-9a99-4a50-ba0c-768a063ffc19", + "uuid": "38eb02e7-5181-47d5-a2e1-f7c688dcaea2", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7774,7 +7814,7 @@ ] }, { - "uuid": "f46cd8a1-8b81-4fe1-abc9-e405ff21486a", + "uuid": "71a727e1-d0a6-4316-bca9-57f176c36bb0", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -7791,7 +7831,7 @@ ] }, { - "uuid": "7d44ed08-a2b5-49a5-9387-811468260f13", + "uuid": "d2c4d5c0-3505-4b60-8bf2-0f391d337136", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -7808,7 +7848,7 @@ ] }, { - "uuid": "7d6031dd-e49b-4d63-a24d-cfe3861c3c0e", + "uuid": "672a01f5-889d-4064-8ca8-6941f27a992b", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7825,7 +7865,7 @@ ] }, { - "uuid": "8bf98bab-6361-419e-aa45-d29e625f63d9", + "uuid": "2051a42e-bd39-40ab-8e89-fedb11d5809f", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -7847,7 +7887,7 @@ ] }, { - "uuid": "2ac3317c-3510-4c2d-9579-71c4a66799b8", + "uuid": "53756ffb-c2dc-453b-83bb-f5f7258b708d", "control-id": "cis_fedora_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -7864,7 +7904,7 @@ ] }, { - "uuid": "f53247ed-e7ec-4bc0-9b48-9caa2e3ee6c2", + "uuid": "2b65564c-96d1-446f-bf20-f8bee0582ec2", "control-id": "cis_fedora_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -7881,7 +7921,7 @@ ] }, { - "uuid": "8ab71352-0a3a-496d-96b7-0b2f6d980077", + "uuid": "29f5e693-637a-42f9-90cb-9f3c85835361", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -7898,7 +7938,7 @@ ] }, { - "uuid": "e885a643-844a-42df-bc50-2f663f4e84c0", + "uuid": "5167c511-fe4d-4eaf-8460-efa66f6327b4", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -7915,7 +7955,7 @@ ] }, { - "uuid": "f59ba12d-c5ca-48a5-a1af-d389eca1eba8", + "uuid": "65dd6363-a139-4557-914e-1bc10240e153", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -7932,7 +7972,7 @@ ] }, { - "uuid": "2ab4b215-c65b-4944-9dbf-9acbc94e0bda", + "uuid": "2f5c047a-33c0-404e-b8f5-1c7a782fbe1b", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -7949,7 +7989,7 @@ ] }, { - "uuid": "37dcf840-eafd-4032-a1df-a2f0250363cd", + "uuid": "0cfe2128-fd6e-479a-b432-83865b395263", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -7966,7 +8006,7 @@ ] }, { - "uuid": "eef8a4d5-79de-4bf3-b762-b5d526651785", + "uuid": "387600cb-4091-47ec-846c-c807b9e4c9a2", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -7983,7 +8023,7 @@ ] }, { - "uuid": "0309505b-d332-4cbb-bb6f-788366a2c4ac", + "uuid": "5529cf7c-034e-4b43-ae09-66346b99f38e", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8000,7 +8040,7 @@ ] }, { - "uuid": "826037da-78e6-4e3d-8715-bd3643859eb2", + "uuid": "fba3a2f6-6645-42aa-a6a7-ac8753b3488a", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8017,7 +8057,7 @@ ] }, { - "uuid": "143d3d89-5324-4b1c-9880-516b021602e4", + "uuid": "2b39b4c1-8d43-4b87-ad02-2a81a102e696", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8034,7 +8074,7 @@ ] }, { - "uuid": "9f0e44da-ebba-4018-b8e1-822c3fac49b1", + "uuid": "515a4dac-4a23-4159-bba9-28880f4f45ce", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8051,7 +8091,7 @@ ] }, { - "uuid": "b88afe37-dc8d-4ce2-9bc8-7cc1838c5862", + "uuid": "f5f49afe-b14c-4a6e-908a-def16b750e84", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8068,7 +8108,7 @@ ] }, { - "uuid": "51fc99c3-cca0-40cc-b36d-b42e87aaa109", + "uuid": "f02984e8-98ba-4a81-8904-183608d31afd", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8085,7 +8125,7 @@ ] }, { - "uuid": "047d621c-9c17-49c6-9e82-0205c2b88554", + "uuid": "0ece49ba-81bc-43c7-942d-97e88ee09fc6", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8102,7 +8142,7 @@ ] }, { - "uuid": "21434e06-7fe5-43ef-8fc6-7b96321524d7", + "uuid": "762346d6-70e6-49f1-bb0c-91a86a72a5d7", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8119,7 +8159,7 @@ ] }, { - "uuid": "a5027379-43cf-4da1-aec4-e7a462ef9dd8", + "uuid": "360fea08-942c-4177-a851-aabf6f16c3b0", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8136,7 +8176,7 @@ ] }, { - "uuid": "66ac8be4-a6b1-4f26-9d16-f2af9829db38", + "uuid": "b3db6f56-7ce3-4b76-9045-73c072ca7813", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8153,7 +8193,7 @@ ] }, { - "uuid": "cec1cd87-cc71-47ac-8723-9c1c9d56a8aa", + "uuid": "db97ac19-6487-41af-8e7c-d599f88beeac", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8175,7 +8215,7 @@ ] }, { - "uuid": "2578705b-56e5-404b-9b89-b65f7cf7cc5f", + "uuid": "ee68c0e9-a5be-4e3e-9615-8ec8491b5147", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -8188,7 +8228,7 @@ ] }, { - "uuid": "ea73fa4f-d097-4cea-a50a-cf39da8fc2cb", + "uuid": "f390ff41-9f74-4a6c-8223-be352a4e7408", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -8201,7 +8241,7 @@ ] }, { - "uuid": "91aa12e2-2045-4ea2-ae9f-a10a2de6529f", + "uuid": "897d0d30-33df-4c3b-bbb3-dc683650abe6", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -8219,7 +8259,7 @@ ] }, { - "uuid": "959e3d79-6d94-447a-b17f-b5de79017a3b", + "uuid": "0e47853e-edaa-4b43-be74-1becae16826c", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -8236,7 +8276,7 @@ ] }, { - "uuid": "5da0c5b4-e7d6-4fbb-a263-9db7c0dbb9a3", + "uuid": "47d6d546-7f31-47ef-aaf1-c2abeb970cff", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -8258,7 +8298,7 @@ ] }, { - "uuid": "d2e0aed5-3a5e-4cb6-b6aa-72454ee24e33", + "uuid": "28d7d19e-6f62-42a1-a534-53636f7d8cd6", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -8285,7 +8325,7 @@ ] }, { - "uuid": "5379e8bf-f046-420c-a445-17a6e7f34461", + "uuid": "7091abdb-7559-4d06-86f2-c31dc5b3ae28", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -8297,7 +8337,7 @@ ] }, { - "uuid": "9a13cf9e-ae5c-4cc8-9d55-eeaa1d494ac8", + "uuid": "d3309f3a-feb2-408a-a5aa-ebd3890c4f51", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -8314,7 +8354,7 @@ ] }, { - "uuid": "3d33d2d1-3b60-4b06-b30b-22c17de921d7", + "uuid": "dac9a265-45e6-4c6d-babb-96dcd7b031b9", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -8331,7 +8371,7 @@ ] }, { - "uuid": "87d50859-be62-492a-901c-afc812d433bd", + "uuid": "39449870-d926-40e6-a71d-c9e15e43316c", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8348,7 +8388,7 @@ ] }, { - "uuid": "b9e23ae3-2e17-4f05-b6f0-28752807385d", + "uuid": "f5dd1705-a7e1-4d56-ad7d-3b9eab811822", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -8365,7 +8405,7 @@ ] }, { - "uuid": "edcf8e38-a743-42aa-aacc-5433ca2d9f50", + "uuid": "e7f456a1-a221-4e6f-9eea-60d2299954c1", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -8382,7 +8422,7 @@ ] }, { - "uuid": "20953724-580d-4155-9d63-b15922131dc9", + "uuid": "c5df273f-13ef-48d8-a079-b1e260a43d9a", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -8399,7 +8439,7 @@ ] }, { - "uuid": "63ce0c0e-9cbb-4bf2-aa82-788ca566e3a9", + "uuid": "1a2a8af0-104e-4804-bfea-87a098187f27", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -8416,7 +8456,7 @@ ] }, { - "uuid": "428ac903-4f2a-46d0-82e5-645cb46f31d3", + "uuid": "8dccc390-c928-4a87-87ac-f2c743d885d2", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -8433,7 +8473,7 @@ ] }, { - "uuid": "f7fc384c-91ad-41b4-90c0-71c3c4caaacc", + "uuid": "509a0e38-2cfa-4737-a4b2-ff684c76bce2", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -8450,7 +8490,7 @@ ] }, { - "uuid": "3bb2bc6d-d6d0-42b7-a45c-6424ba4cd3c9", + "uuid": "66174d24-5331-48c8-b2ed-812b61719af8", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -8467,7 +8507,7 @@ ] }, { - "uuid": "8425b835-4257-4eb8-9d7e-effb9a39c633", + "uuid": "61563806-41f3-43a0-919c-842457691ca0", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8489,7 +8529,7 @@ ] }, { - "uuid": "bcab8850-c9b0-4367-9708-72a1b774c86b", + "uuid": "5c02ddcf-9bdc-4473-ae0d-5e92ff9b57e4", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -8502,7 +8542,7 @@ ] }, { - "uuid": "dd1c82a1-a4f9-4751-82c5-9a137bb345ce", + "uuid": "6e92d12a-8fd2-4df8-a268-75fdbad97f63", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8519,7 +8559,7 @@ ] }, { - "uuid": "eae7f778-58c7-47c2-a40c-3e1675c5bf5f", + "uuid": "9a7fce0b-cb3f-41df-a230-27bd0a0a7689", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -8536,7 +8576,7 @@ ] }, { - "uuid": "5232a13a-d1de-4f66-8eab-f068a026aa07", + "uuid": "a9e6e47e-7f6f-44a6-828f-ee8816ef014e", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8553,7 +8593,7 @@ ] }, { - "uuid": "1af6690c-6606-4df1-b32b-d6f7bb23fd92", + "uuid": "c567d457-6161-4d19-b16c-7af5d200c10c", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8575,7 +8615,7 @@ ] }, { - "uuid": "fce1ffa5-a20c-4336-a6d7-949119adc1f6", + "uuid": "a5470ce8-3e39-4a26-bf91-2b8bf0c42539", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -8592,7 +8632,7 @@ ] }, { - "uuid": "0a00ce81-1889-4081-b3ba-74b8981d8981", + "uuid": "1099ca98-df9b-4e19-af57-b0c5d4b86391", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8614,7 +8654,7 @@ ] }, { - "uuid": "5d3e35d3-484a-4fba-89df-2c17aed54e1f", + "uuid": "775aff8c-ca18-43eb-a1c3-7bba54b53aea", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8636,7 +8676,7 @@ ] }, { - "uuid": "0c6e325c-cfa4-409b-b21a-f741fa5f3cc3", + "uuid": "dc9c7a22-30a9-454a-840c-ce2a6910dc88", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -8653,7 +8693,7 @@ ] }, { - "uuid": "62122cc1-e348-43fa-a079-740d9b6226e5", + "uuid": "d3506fdc-a51f-4364-b3ee-7a751e485f31", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8675,7 +8715,7 @@ ] }, { - "uuid": "ef54e0a0-65ab-4579-9f09-989a8d172560", + "uuid": "1077a39b-05a4-458a-bc0f-1dcbed207865", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8692,7 +8732,7 @@ ] }, { - "uuid": "7640a5ce-1364-4cbb-b826-f616cf765fa4", + "uuid": "a34c4bcc-9c8d-498f-a00f-e455a5e5b840", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8709,7 +8749,7 @@ ] }, { - "uuid": "cdbc8b73-7910-4a4b-977a-1e0a19d6caca", + "uuid": "4698328e-601f-4606-8269-35b98a6e5124", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8726,7 +8766,7 @@ ] }, { - "uuid": "4ca5375e-456a-4092-8a9e-772a9fb1b0a0", + "uuid": "0a8f83a6-62fc-4fb7-8294-8bad69fffafc", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8743,7 +8783,7 @@ ] }, { - "uuid": "66db2c79-f7b2-4ff2-bd8a-f4ab99c29bb1", + "uuid": "7da22163-e4ac-4a72-a4f1-7d6747c4d6eb", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8760,7 +8800,7 @@ ] }, { - "uuid": "2b981b3d-05b5-478f-bc19-a2345bb0a9c3", + "uuid": "68c9d9ef-cff8-4987-afc8-42167e0827dc", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8782,7 +8822,7 @@ ] }, { - "uuid": "a20390f0-7171-4750-9e6e-1c468e31c2cf", + "uuid": "59167042-7ee1-4ae2-a995-57dd86042cf9", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8799,7 +8839,7 @@ ] }, { - "uuid": "c5b75853-d848-4c70-ac28-51b0a086b8cc", + "uuid": "8aaad82c-3a1b-443b-9f2d-5acf71727c57", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8821,7 +8861,7 @@ ] }, { - "uuid": "f4d392e3-1839-4792-b780-7c9e243b204f", + "uuid": "d6421b77-6888-4b12-bd02-ceffa14ad398", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -8838,7 +8878,7 @@ ] }, { - "uuid": "587892c6-dfe4-4996-8817-860b6a11e9b2", + "uuid": "f4c36fc8-b6b2-4351-903a-6f5aab7c56b7", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8855,7 +8895,7 @@ ] }, { - "uuid": "241f5a46-966e-4929-b65c-264e90d86c7e", + "uuid": "02b2736c-f4c2-4127-8e27-855d4ec6cc30", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -8882,7 +8922,7 @@ ] }, { - "uuid": "a7292d69-2e71-4054-8fcb-b32d59cd6680", + "uuid": "42bf6b88-a187-43ea-aabd-3859fb6b51c6", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -8904,7 +8944,7 @@ ] }, { - "uuid": "c459529f-80a1-47fe-9644-5f8f4f824e30", + "uuid": "b6704f89-31c8-4235-a3c1-562c3d4ac2cd", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -8921,7 +8961,7 @@ ] }, { - "uuid": "b6e167f4-9b93-459e-abe1-9b4105934442", + "uuid": "d78e35fa-d0bf-41c2-a8e1-74fe225be9ed", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -8938,7 +8978,7 @@ ] }, { - "uuid": "a4d407dc-6605-47f1-892f-b4adecc2ebd8", + "uuid": "f80bdb3e-48df-46ca-969d-66cdf46061de", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -8955,7 +8995,7 @@ ] }, { - "uuid": "d109392b-882e-4258-82d0-614b54ab5f62", + "uuid": "530deada-a395-4d03-a4e2-175edce18b27", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -8968,7 +9008,7 @@ ] }, { - "uuid": "4a0e9f28-def2-42c1-abad-4cf352895406", + "uuid": "5d186f16-5a28-471e-a489-ebbc9799e615", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -8981,7 +9021,7 @@ ] }, { - "uuid": "a6df92d9-7302-4217-a8fb-7726fa3e3e5f", + "uuid": "f86690de-3a6b-433a-a42c-5f327d26a3fb", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -8998,7 +9038,7 @@ ] }, { - "uuid": "1c29fd05-c3a0-4895-b344-e37aacdf3f32", + "uuid": "34c30d77-2602-4b3d-b0c7-621084323f6f", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9015,7 +9055,7 @@ ] }, { - "uuid": "086bcefb-33c9-469b-a5bd-3aa62d8360bc", + "uuid": "7c123459-25bf-422a-bab8-80298435462e", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -9028,7 +9068,7 @@ ] }, { - "uuid": "63a28bdf-a964-4baa-ba78-c1d9f4e49db6", + "uuid": "b0c8ef2e-9792-4592-87d8-d2884c35e1f4", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9045,7 +9085,7 @@ ] }, { - "uuid": "f0b5b0e4-64cc-4b11-b400-2527ffe6e208", + "uuid": "1969ec35-af7e-4465-9129-192fcc9b9fc3", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9062,7 +9102,7 @@ ] }, { - "uuid": "54aed2a2-9471-4cca-86bd-795302cb94ff", + "uuid": "2017e340-b414-4cb5-a6e8-a6c9bbb82392", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9079,7 +9119,7 @@ ] }, { - "uuid": "c950265d-1b58-486f-baf8-ad157c1adb00", + "uuid": "91b9a23c-b6ce-4dad-9b67-c7ecdc15f0f6", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9096,7 +9136,7 @@ ] }, { - "uuid": "ada7b3ad-c792-4f62-aaae-247c1faeea04", + "uuid": "916983a7-66e8-4218-92cc-816d7058144f", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9113,7 +9153,7 @@ ] }, { - "uuid": "a79626e3-ffe6-46b5-8fe9-df867dcaaa73", + "uuid": "21591e28-7c3f-48b0-9c7b-2ba47c028619", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -9125,7 +9165,7 @@ ] }, { - "uuid": "4c0d4349-d622-48a5-b05a-9f98de2a640a", + "uuid": "d308ab09-446e-4c88-b913-6d660edaef75", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -9137,7 +9177,7 @@ ] }, { - "uuid": "8e8a9740-3e2c-47cc-ad08-d92d3822b2a9", + "uuid": "9dd1dfeb-b4df-4188-8a44-4c2cd6519cd2", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -9149,7 +9189,7 @@ ] }, { - "uuid": "cef991d8-7233-4a39-8b91-cf736975fd32", + "uuid": "10d46724-b0f9-440d-b1ee-512d5839de23", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -9161,7 +9201,7 @@ ] }, { - "uuid": "fc933f72-0879-4caf-aa7e-84b9ff24d2eb", + "uuid": "9f24b909-6fc1-4ce9-95c5-bb5d70271a1b", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -9174,7 +9214,7 @@ ] }, { - "uuid": "2b192dc8-10e4-4430-90bf-822ff70d5202", + "uuid": "da35c8ea-4baf-4a81-bbf9-1f738b1f882f", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -9187,7 +9227,7 @@ ] }, { - "uuid": "f6dfbfd7-6512-4e93-9a04-e3f33362444b", + "uuid": "c6ae3f4d-74bb-45f4-bce7-02ec242b461e", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -9199,7 +9239,7 @@ ] }, { - "uuid": "18419d06-ad04-48d5-9f03-925211da1002", + "uuid": "5beeeb29-c74f-47c4-90c8-f6fa9c4593e7", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -9212,7 +9252,7 @@ ] }, { - "uuid": "e2cbb22d-ee9a-4117-b2f3-fa1c14d299bb", + "uuid": "95b92d7d-8764-44f7-8d79-a8575dd5dc76", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9239,7 +9279,7 @@ ] }, { - "uuid": "0c971e66-2191-49e7-acac-ffc7047e1996", + "uuid": "9ffe82c0-8a78-444b-bdd7-034a700f487c", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9266,7 +9306,7 @@ ] }, { - "uuid": "7279a689-9bf4-47db-b776-252459350c33", + "uuid": "fa33fdc5-0dc3-4bc8-a4ba-ae3abe2b8460", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9293,7 +9333,7 @@ ] }, { - "uuid": "4d8d14bc-aacb-41d6-8318-366a572331d9", + "uuid": "38da09fc-6daf-4d54-bd2e-3bdd7cf8499d", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9320,7 +9360,7 @@ ] }, { - "uuid": "423fd35f-7f15-4da7-89af-1508535c7c3a", + "uuid": "11373c70-4c7b-468b-992e-29eb320a57a2", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9347,7 +9387,7 @@ ] }, { - "uuid": "7d906f23-3883-4ff5-8ffe-3e520f873eda", + "uuid": "466b684c-0b83-4139-8e80-40f6f530a353", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9374,7 +9414,7 @@ ] }, { - "uuid": "544da3de-edad-48b4-b911-fbeb518e1c9b", + "uuid": "e0e22cb4-0400-430d-984d-f2a40084db2c", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9401,7 +9441,7 @@ ] }, { - "uuid": "f09cdc7f-c8db-485d-92c2-61801a40a55f", + "uuid": "e766d207-b6b6-4f72-a741-2ebe3fe0f1ad", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9428,7 +9468,7 @@ ] }, { - "uuid": "034d3abd-5930-420a-8e26-4e4d2e4ca4df", + "uuid": "2cf19fe7-61c1-41fa-b825-bb5d3b7477e2", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9455,7 +9495,7 @@ ] }, { - "uuid": "100737d1-4499-48b2-8339-df10957f073d", + "uuid": "eba8e5da-b132-4bcd-94fd-e3a486ea9080", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9482,7 +9522,7 @@ ] }, { - "uuid": "055b3cd4-f6ff-4b79-9386-ee017f3aea63", + "uuid": "9a192322-f9a0-419e-ba7d-429306704dac", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9524,7 +9564,7 @@ ] }, { - "uuid": "65376265-0eb7-44b5-81be-bc04f16c0f64", + "uuid": "6da935f2-465f-49f6-9904-d89fa07b527d", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9546,7 +9586,7 @@ ] }, { - "uuid": "7392b12e-688b-47c1-9fe7-a22bbe04ee9f", + "uuid": "0f625fcf-74b5-4256-81b5-5237444373e4", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9568,7 +9608,7 @@ ] }, { - "uuid": "09624410-1e55-4fcc-872d-d0a628717c0b", + "uuid": "31e8d463-8923-40e4-9b4c-a8a0e348b0b8", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -9581,7 +9621,7 @@ ] }, { - "uuid": "a57b29a8-7c4a-4f09-a0cd-3b278ce25a08", + "uuid": "12c170e1-a3b0-4234-b4fd-e02805768b38", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9598,7 +9638,7 @@ ] }, { - "uuid": "9a903696-b1cd-4f9f-a509-c5a8d33fbd2d", + "uuid": "17f6f88c-ce7f-442b-b54d-20d02dbe81cc", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9615,7 +9655,7 @@ ] }, { - "uuid": "bb13d7a5-656c-41b3-85bc-f11ad64794c1", + "uuid": "b97cdbf3-81e2-49f3-9e3b-35c59ee9c55e", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9632,7 +9672,7 @@ ] }, { - "uuid": "4ad1f6a4-5cce-4a0b-acb4-2a8b383afb55", + "uuid": "547a3aaf-deb8-4213-b030-61aa93c41148", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9649,7 +9689,7 @@ ] }, { - "uuid": "db078d59-9f53-40d3-a8cd-31ce382203e4", + "uuid": "5df5b5d5-f914-4fa5-b602-3e75c92579b3", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9666,7 +9706,7 @@ ] }, { - "uuid": "d3d2fad7-3a25-419d-9305-9ac030b38315", + "uuid": "8214d4b9-1942-49f6-9f25-8e22675c2ece", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9683,7 +9723,7 @@ ] }, { - "uuid": "2d6b4055-236a-4a0b-8d18-5d03ebf87aad", + "uuid": "06ca7329-649d-4052-93d1-7ae3082d2714", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9700,7 +9740,7 @@ ] }, { - "uuid": "76f1ae7b-0bc7-4bbe-a832-b4fa1bbf0505", + "uuid": "58bf9e1c-7a83-4d8b-b7b4-2dbca2d375b4", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9727,7 +9767,7 @@ ] }, { - "uuid": "4c869c2a-46b7-4156-9d6a-48c1f96558d5", + "uuid": "ebac91d6-ed2d-464e-80fd-d4e2b1b7e256", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -9828,103 +9868,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -9936,67 +9976,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -10008,13 +10048,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -10026,13 +10066,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -10044,31 +10084,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -10080,49 +10120,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -10134,13 +10174,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -10152,31 +10192,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -10188,13 +10228,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -10206,13 +10246,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -10224,13 +10264,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -10242,13 +10282,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -10260,13 +10300,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -10278,13 +10318,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -10296,265 +10336,265 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -10566,234 +10606,252 @@ { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_postfix_inet_interfaces", + "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for inet_interfaces in /etc/postfix/main.cf", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", + "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_screensaver_lock_delay", + "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", + "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", + "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_policy_name", + "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", + "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_max_sessions", + "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of open sessions permitted.", + "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", + "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_keepalive", + "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of idle message counts before session is terminated.", + "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", + "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_login_grace_time", + "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", + "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 60, 60: 60}", + "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_maxstartups", + "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", + "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", + "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sudo_timestamp_timeout", + "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", + "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_user_initialization_files_regex", + "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_user_initialization_files_regex", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" }, @@ -11424,6919 +11482,6943 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "ensure_gpgcheck_globally_activated", + "remarks": "rule_set_028" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "remarks": "rule_set_028" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_gpgcheck_globally_activated", + "remarks": "rule_set_028" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_028" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_libselinux_installed", + "remarks": "rule_set_029" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libselinux Package", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libselinux_installed", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libselinux Package", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_selinux", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux Not Disabled in /etc/default/grub", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_selinux", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux Not Disabled in /etc/default/grub", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_not_disabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux is Not Disabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_not_disabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux is Not Disabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_mcstrans_removed", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall mcstrans Package", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_mcstrans_removed", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall mcstrans Package", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_boot_grub2", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must have mode 0600 or more restrictive", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_boot_grub2", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must have mode 0600 or more restrictive", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_boot_grub2", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be owned by root", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_boot_grub2", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be owned by root", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_boot_grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be group-owned by root", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_boot_grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GRUB configuration files must be group-owned by root", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_314" + "remarks": "rule_set_315" } ], "control-implementations": [ { - "uuid": "5b1d2f62-95bc-44f4-a936-b65e02156e02", + "uuid": "6d99bb1d-4d86-4348-bf62-4923058f87e6", "source": "trestle://profiles/fedora-cis_fedora-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -18354,17 +18436,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -18680,7 +18768,7 @@ ], "implemented-requirements": [ { - "uuid": "ec5eecd6-e4fc-432a-a6a6-92d0f7420523", + "uuid": "c80f39a2-8375-445a-b6a5-9c4e7233ac61", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -18697,7 +18785,7 @@ ] }, { - "uuid": "2a9339b8-283e-4a8c-bf3f-9821cbba448b", + "uuid": "a63b8e4e-77d2-4ca0-ab73-93e0c6ce400a", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -18714,7 +18802,7 @@ ] }, { - "uuid": "ff3bbab7-0a40-4905-8343-ea85ed47d849", + "uuid": "6025c11b-8cf9-4802-bc26-2be624ef9747", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -18731,7 +18819,7 @@ ] }, { - "uuid": "b4bdf88b-0312-4f33-a62b-211111cd636e", + "uuid": "c4e7e724-18dc-44e6-903c-b1b5dfa97068", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -18748,7 +18836,7 @@ ] }, { - "uuid": "c72ba743-eb54-4455-bc1f-54eb0aee2b04", + "uuid": "c1ef406b-f00b-40cb-86a2-23657f497d3f", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -18765,7 +18853,7 @@ ] }, { - "uuid": "64884899-3254-41e4-b928-db23ce7b4111", + "uuid": "27c05672-b240-44ab-a67c-27268068f439", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -18782,7 +18870,7 @@ ] }, { - "uuid": "7627b62d-4e0e-42e8-98b6-aeb0be70d6d8", + "uuid": "3085c862-3c6f-42d7-a1c9-478bd30d9598", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -18795,7 +18883,7 @@ ] }, { - "uuid": "cc8bf496-9ba6-4464-b03e-c3bf0203f3f9", + "uuid": "7271ef96-f790-4eae-b2b2-d6f773e26783", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -18812,7 +18900,7 @@ ] }, { - "uuid": "c9577b5b-3858-4a43-8749-a5212470cb43", + "uuid": "1f317c7e-b1e1-4dc7-8cf5-dc33ce7f80f9", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -18829,7 +18917,7 @@ ] }, { - "uuid": "6d8acefd-c671-469a-a97f-2b04770e58da", + "uuid": "c9097e69-1516-46f4-9661-fa6aa70c967e", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -18846,7 +18934,7 @@ ] }, { - "uuid": "1004d419-2b4a-452d-b545-b28bf4a8e6e5", + "uuid": "05de5b80-eead-4a7b-9789-3c1a58ee5359", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -18863,7 +18951,7 @@ ] }, { - "uuid": "b993d912-7bc4-4ab7-b66b-53dd27f8bdcd", + "uuid": "73cd9c49-dc62-4065-8b8b-cba3010f32a6", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -18880,7 +18968,7 @@ ] }, { - "uuid": "810a949b-b386-4e44-889c-dcdbd77a5edd", + "uuid": "e26e3061-6256-4ebb-9f8e-4b6cc73c4418", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -18897,7 +18985,7 @@ ] }, { - "uuid": "e4b64bb9-6038-4366-a6fa-740c67565339", + "uuid": "3e773c3c-8eab-4b42-81b0-21d55598a31d", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -18914,7 +19002,7 @@ ] }, { - "uuid": "b48399b3-0470-49c0-a54c-6fe4c773c5ce", + "uuid": "54e18d34-78a1-41d8-a7e9-560ce2b34233", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -18931,7 +19019,7 @@ ] }, { - "uuid": "1f3ab228-da87-4a2d-95ea-0691cb31d6d4", + "uuid": "f6e2dfe8-cbe4-42a0-939f-96df8e840668", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -18948,7 +19036,7 @@ ] }, { - "uuid": "853ebe45-2820-427e-9b18-43e3210cd57c", + "uuid": "8906c0cf-d146-4a6a-8764-6cb6aba39292", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -18965,7 +19053,7 @@ ] }, { - "uuid": "24ff1eed-ccc8-4bff-9a50-c0f9f104f57f", + "uuid": "03aa7ecc-fa9e-4fb1-b5e2-409ea1d82e1f", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -18982,7 +19070,7 @@ ] }, { - "uuid": "24ad3923-443a-4c26-911e-e01f8a438695", + "uuid": "5b58a94b-bbfe-4037-9d6a-1e2d9ba03e22", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -18999,7 +19087,7 @@ ] }, { - "uuid": "904d081f-e2d0-41c1-8748-8d4931570a7e", + "uuid": "c2567282-3e94-4860-ac20-ab3d7d0296e3", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19016,7 +19104,7 @@ ] }, { - "uuid": "cb1e2ba4-5c60-4742-9016-24f4b38f8865", + "uuid": "03caf59b-4624-428b-92b1-bd763afd628c", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19033,7 +19121,7 @@ ] }, { - "uuid": "fae6a982-6789-4d5a-81eb-47fcbd891e23", + "uuid": "987beaac-088f-4c08-97b8-f87ebd0abf8e", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19050,7 +19138,7 @@ ] }, { - "uuid": "30c97758-a5f0-4f95-bdc9-88186eb09d22", + "uuid": "b315f6ff-9d5f-48c0-b49f-ba3f41544169", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19067,7 +19155,7 @@ ] }, { - "uuid": "4232b73e-04cf-4335-bd94-2b55b7c68b8a", + "uuid": "5547eb5c-17db-40c3-a620-6a7a183ef863", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19084,7 +19172,7 @@ ] }, { - "uuid": "efec6dae-2007-4823-8e7e-d68c7a9c788f", + "uuid": "3048d1c4-12cb-48ba-898b-8e9c7d8f46ec", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19101,7 +19189,7 @@ ] }, { - "uuid": "1553058e-f063-40b9-bd6e-9ff68fe3a284", + "uuid": "d9bc3578-cac3-42ab-9eaa-f0503572312f", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19118,7 +19206,7 @@ ] }, { - "uuid": "f6535b33-b0f1-4657-9389-264954c87dfb", + "uuid": "6d6d467b-6093-4ffc-81e7-547dc6255cf7", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19135,7 +19223,7 @@ ] }, { - "uuid": "c2d9fe01-7f5e-4757-8531-18df6ebeb78c", + "uuid": "a4a6a008-ca3d-4d17-90fe-833cf2907adc", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19152,20 +19240,24 @@ ] }, { - "uuid": "1442e267-0b63-465b-81c5-441590c7d3d8", + "uuid": "5a55b3df-b1a3-477d-8e01-6a5d20779a5d", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "a3e40a1a-b081-4307-b0c5-8290b31e8608", + "uuid": "f32408cc-e738-4f5a-b54b-20a7c1624c2b", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19182,7 +19274,7 @@ ] }, { - "uuid": "cf783e65-cca5-4103-be52-2e524021b7f3", + "uuid": "97e691ea-415a-46a1-98d3-7a9b68673b19", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -19195,7 +19287,7 @@ ] }, { - "uuid": "51d1b9ee-f3ec-4da4-b55d-ac76334d5d12", + "uuid": "cc5e4005-76f8-4f60-b04f-c75d8ce3a0c6", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -19208,7 +19300,7 @@ ] }, { - "uuid": "a7d49d42-f6d3-4374-a08a-094bc7cd08b4", + "uuid": "8051b9af-b206-4279-b648-65544609d734", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19225,7 +19317,7 @@ ] }, { - "uuid": "1c54067b-5b35-42d8-804b-5dc24814d1b7", + "uuid": "f53437a1-6620-4ff3-9b7e-645e210eafeb", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19242,7 +19334,7 @@ ] }, { - "uuid": "21b123df-553e-45a1-bae2-86e388de164f", + "uuid": "5f93dba7-095b-4963-a2a2-55733599f14d", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19259,7 +19351,7 @@ ] }, { - "uuid": "904de995-3aab-4beb-83a6-2dc2d7ae43cd", + "uuid": "9f2bf5c2-e42b-4322-b4a7-76d5c8aef837", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19276,7 +19368,7 @@ ] }, { - "uuid": "bff83d54-da52-4b8d-9374-4debec59f835", + "uuid": "63bef1a7-da31-4c55-9ef8-5569f394bdd9", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19293,7 +19385,7 @@ ] }, { - "uuid": "dcf703ce-927d-4bb2-93c0-ea0bf9151812", + "uuid": "ac365c53-bf62-4ea1-96e8-ba27eec15d57", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19310,7 +19402,7 @@ ] }, { - "uuid": "aeb49c86-9c07-4451-8b2a-2313a1edd987", + "uuid": "d3d4e2c7-59ae-431f-ba0d-d10b05e4c52a", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -19337,7 +19429,7 @@ ] }, { - "uuid": "34f54527-c6da-4522-8206-78d70167cb8d", + "uuid": "23b68b92-0af0-4ce6-aa86-0396c368a57c", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19354,7 +19446,7 @@ ] }, { - "uuid": "7a3372a5-2a96-4e05-adf2-12de52b1adf1", + "uuid": "93006cd0-1be5-4b52-917c-7e576ead4c31", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19371,7 +19463,7 @@ ] }, { - "uuid": "6d99cc92-388a-482c-a288-a822f3d04d49", + "uuid": "e0875103-811c-4aa3-9d46-f0d3520726f4", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -19388,7 +19480,7 @@ ] }, { - "uuid": "a4086672-c44c-499a-9008-b5455c65fc78", + "uuid": "bcb12454-c041-4f5b-99fd-3766edd78aa2", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19405,7 +19497,7 @@ ] }, { - "uuid": "e1ece0eb-9097-4aae-b026-0d349bcb8176", + "uuid": "7be6194c-c300-4328-98ee-758bb7099012", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19422,7 +19514,7 @@ ] }, { - "uuid": "8e391a5e-9ced-448e-81ea-9eecd826ff29", + "uuid": "23504a82-8fe7-4624-8764-efd44e3c0e07", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19439,7 +19531,7 @@ ] }, { - "uuid": "eb0289d6-7a41-48eb-ba5e-3cf172e8af9d", + "uuid": "3fd7272c-1181-4e89-8459-3fd236a41314", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19456,7 +19548,7 @@ ] }, { - "uuid": "3a9135a0-742b-4f98-a28e-e8b7d069767f", + "uuid": "4ebed198-d3c5-4dc6-91e2-d2f93457a960", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19473,7 +19565,7 @@ ] }, { - "uuid": "20dd73ce-fffa-409d-b16a-6994b3d39f63", + "uuid": "18ba28dc-ea9c-4621-9e08-989d452886ee", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19490,7 +19582,7 @@ ] }, { - "uuid": "d1a5944e-b29d-4613-8bc5-79e6826ca288", + "uuid": "68634737-7ad5-437f-81bc-aa443b2f790c", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19507,7 +19599,7 @@ ] }, { - "uuid": "d9d34fcb-a092-49e3-abb8-16b17f2f0730", + "uuid": "665b9866-e4e9-4c85-aac7-9f75c6937258", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19524,7 +19616,7 @@ ] }, { - "uuid": "705792cd-ffce-4d80-bbf8-076e36ead468", + "uuid": "3e228ffd-5445-42ae-8740-9407eeff6eb7", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19541,7 +19633,7 @@ ] }, { - "uuid": "7828de78-5b24-4c90-9c13-80aebf8790af", + "uuid": "bd28ba49-7734-49b5-8fc7-e5b8ae76dfac", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19558,7 +19650,7 @@ ] }, { - "uuid": "716dad90-4ce2-4ff7-9550-4414d3873aa3", + "uuid": "e5129277-5ad2-478c-9784-4ab37eaff5f8", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19575,7 +19667,7 @@ ] }, { - "uuid": "892e5b0b-58d1-42b1-9a56-37792e9a5b96", + "uuid": "d3ca154c-e779-482f-880f-071d075cb46a", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -19592,7 +19684,7 @@ ] }, { - "uuid": "4045ebc2-341a-4ec9-8df2-760c99e7f1a6", + "uuid": "6ee20fcc-1451-410f-bb7a-08fb9e9300a8", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -19609,7 +19701,7 @@ ] }, { - "uuid": "b3091147-b24c-4e22-94d5-849a8d3290da", + "uuid": "4bda4bf6-5717-4e06-9872-efcd5167acda", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -19626,7 +19718,7 @@ ] }, { - "uuid": "7f88f63a-4a9c-4c0e-9e2e-179a2496b8ba", + "uuid": "64c4868e-64a6-45c2-92b9-8fe02239e096", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -19653,7 +19745,7 @@ ] }, { - "uuid": "21de2347-70ec-404d-b92b-eecce73a7ff5", + "uuid": "e26c803b-0f0a-430f-a063-96febab8ce78", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -19680,7 +19772,7 @@ ] }, { - "uuid": "40d46b9b-7bfa-4421-987a-45ca2141a83e", + "uuid": "d38ca75d-1c85-4246-bade-43838dc118d3", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -19707,7 +19799,7 @@ ] }, { - "uuid": "deaa2451-dc50-45d3-a0b3-e1a7ae155ca1", + "uuid": "baccd65c-9406-4ea6-886a-a1a6b4c79579", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -19729,7 +19821,7 @@ ] }, { - "uuid": "f0f39b8e-be98-4b66-b8cf-687cb8495397", + "uuid": "c742f75a-a54f-4fd0-9b0b-648fa0426538", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -19746,7 +19838,7 @@ ] }, { - "uuid": "23e90e42-1a46-4ffc-8eae-b8d43c8ea082", + "uuid": "9801f930-4e91-4bf1-99e3-1bb41a617c73", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -19778,7 +19870,7 @@ ] }, { - "uuid": "5f98c840-fac9-4088-afc9-4e91c76bf844", + "uuid": "a28ba64b-5f30-4f5d-91a2-3c43a58ac5a8", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -19795,7 +19887,7 @@ ] }, { - "uuid": "f4ec93d2-6721-44d9-8e95-9a5399ad8be8", + "uuid": "7e98f676-567b-45e4-9478-45c459d6e87a", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -19808,7 +19900,7 @@ ] }, { - "uuid": "42616ac1-9bf9-4b7a-8e0b-efe1c95dffb4", + "uuid": "32a3d7ac-2198-456b-9481-42c3ecae6743", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -19825,7 +19917,7 @@ ] }, { - "uuid": "8028f10d-4e71-427c-a207-06506de3b372", + "uuid": "5f0c55d7-2b20-48c9-aa46-cc05e55cbb31", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -19842,7 +19934,7 @@ ] }, { - "uuid": "cc7ca286-891e-490a-826f-35ae8484127f", + "uuid": "36a0fa54-e1d8-4864-ab39-05ca54becac9", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -19859,7 +19951,7 @@ ] }, { - "uuid": "f25e65fc-17df-4669-8a8d-c91da367d720", + "uuid": "a878c1f7-83bb-4049-a377-2f937258ccd5", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -19876,7 +19968,7 @@ ] }, { - "uuid": "d21686eb-429f-4340-af78-ee9d9efc944d", + "uuid": "8d0becc8-ccad-4538-9a64-d3f77fe33934", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -19898,7 +19990,7 @@ ] }, { - "uuid": "39f89cc3-98e0-4268-b1ab-76537e09fbd6", + "uuid": "e1f01da6-1e14-44c2-b8cb-a2123d86d0af", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -19915,7 +20007,7 @@ ] }, { - "uuid": "8f2a5ab4-89cf-4f80-95af-643b3d7ae670", + "uuid": "7d49e904-e95d-486e-8779-895949f8a7bc", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -19927,7 +20019,7 @@ ] }, { - "uuid": "3585d789-3406-4fb8-80b1-c2660b9b1ef2", + "uuid": "1fa9093a-b195-46d2-8cc0-46b1600501f5", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -19944,7 +20036,7 @@ ] }, { - "uuid": "49f0a728-6f0c-4672-b601-117b6222146a", + "uuid": "f327b674-081d-43df-a695-a85a54895d45", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -19961,7 +20053,7 @@ ] }, { - "uuid": "bb07faf8-3ecc-4e96-827c-50dc9570f098", + "uuid": "3514b854-1ae0-4fd5-a5a7-303c8fd34e34", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -19978,7 +20070,7 @@ ] }, { - "uuid": "e8f51fed-9d65-477f-9e5e-82fdc1acf6d5", + "uuid": "f017dd89-ddc7-4f67-8f1e-99bb13f04e32", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -19995,7 +20087,7 @@ ] }, { - "uuid": "a255558d-8dab-4f23-b699-51350506598c", + "uuid": "681ec31c-577b-4d12-ac76-60ff2d196bbf", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20012,7 +20104,7 @@ ] }, { - "uuid": "60f1836c-0ca0-4beb-b82f-c6707808ec9c", + "uuid": "4bde4307-d80d-45a2-a54e-6867ad3e51fa", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20029,7 +20121,7 @@ ] }, { - "uuid": "fa8d7877-5aec-45ae-ac30-ca05bb35379d", + "uuid": "a4c6ac05-24ef-463d-bfc5-bebca6242ac0", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20046,7 +20138,7 @@ ] }, { - "uuid": "97737a24-c722-4f01-b7a0-0f98b9442870", + "uuid": "696a3d03-cf35-4c0e-a371-c22ccd64e323", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -20068,7 +20160,7 @@ ] }, { - "uuid": "0be26a9f-4e8c-4029-b3e4-3479ae599b8f", + "uuid": "6a00506e-7be8-4802-bde5-fc3376fa4513", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -20081,7 +20173,7 @@ ] }, { - "uuid": "259a466e-6200-46f4-a28d-5bb60ba2cce4", + "uuid": "7b278a82-1233-4082-aaf9-d08d12a74e57", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -20103,7 +20195,7 @@ ] }, { - "uuid": "19255af3-fdc5-4c56-8796-11be01402bb0", + "uuid": "d2378603-50a0-4c7c-932d-21fc22773a86", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -20116,7 +20208,7 @@ ] }, { - "uuid": "29671ef8-2f68-42f2-83d8-f0f0f405038f", + "uuid": "2963dfd9-37e6-4770-adce-e1e11ec728ee", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20133,7 +20225,7 @@ ] }, { - "uuid": "48807615-7a9d-4281-887a-dc20e95439df", + "uuid": "c33a1b99-111f-4007-bbc2-fdf0db9bdd8f", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20145,7 +20237,7 @@ ] }, { - "uuid": "919f78cf-9cf8-4ad7-9708-a53f45d73065", + "uuid": "397c4a3b-9de5-4ac2-8e72-69544f73d075", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20162,7 +20254,7 @@ ] }, { - "uuid": "f30fb347-b4a3-4662-8414-5b635221005c", + "uuid": "d10c1fb7-5e34-495a-bd20-00ae31c663bc", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -20179,7 +20271,7 @@ ] }, { - "uuid": "609b080c-d3bd-4249-a3f8-bdba3e7d7bae", + "uuid": "ad5ac7db-7c63-408f-95a2-3236fdf05219", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20191,7 +20283,7 @@ ] }, { - "uuid": "37ddfd4d-6059-4fe9-b61e-6e742cd1621d", + "uuid": "495f9af0-b9da-4fe7-805c-52713aa5aaeb", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20208,7 +20300,7 @@ ] }, { - "uuid": "0ae5da52-3a3a-475b-ba4a-a8ba57e6f2f0", + "uuid": "332d9a85-e4dd-4adb-80b5-7c3c3ae56834", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20225,7 +20317,7 @@ ] }, { - "uuid": "2c93df34-18aa-4577-8be1-da5090ae13c5", + "uuid": "fe0e26bc-3b44-4482-a97e-c91c573f66c8", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20247,7 +20339,7 @@ ] }, { - "uuid": "85e26e38-68cf-4009-b2ab-e1f57614cad1", + "uuid": "d24b6b25-3a5a-4469-bf88-0287ec6d5ee4", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20274,7 +20366,7 @@ ] }, { - "uuid": "89aafeba-3363-4055-9033-b8e9a3b695b9", + "uuid": "cfc45b7f-3332-43fb-abe9-ae94ee2f9ddd", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20301,7 +20393,7 @@ ] }, { - "uuid": "530bf302-be11-4cc7-bf55-84a43f00715d", + "uuid": "c40876cd-958c-4bf6-b706-4e7459fb99bb", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20328,7 +20420,7 @@ ] }, { - "uuid": "48ef839a-ecc6-4a2a-86e4-e0cb10bc64ed", + "uuid": "bd23c4c6-2f72-4795-881e-33a8dd743f6a", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20355,7 +20447,7 @@ ] }, { - "uuid": "36586c21-c421-4524-950e-c0b03cd46e24", + "uuid": "61026f6a-039f-4b91-b05e-a05171c74ab3", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20382,7 +20474,7 @@ ] }, { - "uuid": "6449dd17-c864-4e9c-b1f9-e68626384aa9", + "uuid": "00c64413-4857-4ebb-86bc-2ede99768421", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20409,7 +20501,7 @@ ] }, { - "uuid": "da9e8676-fdff-45ce-9bc3-2f45ca357ce3", + "uuid": "9be5f742-880b-45f7-9451-f13606103afe", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20436,7 +20528,7 @@ ] }, { - "uuid": "8cf72135-21c8-4341-809d-50fd61dd518d", + "uuid": "4d786e29-a697-422f-b9a4-1ccbacd6d4d6", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20473,7 +20565,7 @@ ] }, { - "uuid": "aec9ddcd-2ec0-4d55-8168-8b3ecb25d2b3", + "uuid": "86fc6721-15f4-4b50-b0f5-1c5f5659f3db", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20510,7 +20602,7 @@ ] }, { - "uuid": "e59cec8f-d860-43e2-971a-788543f98e81", + "uuid": "9e92189a-208b-4f07-aeeb-00ac9aa9cda7", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -20523,7 +20615,7 @@ ] }, { - "uuid": "7438c604-e522-487a-be08-739ffc17abb2", + "uuid": "e07fa484-ec3a-4347-9c2f-0c5844d05c1f", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -20540,7 +20632,7 @@ ] }, { - "uuid": "56de8634-3170-43fb-841a-b49e372d0738", + "uuid": "8c8bbf31-8cc0-47be-bbb7-304654af33fc", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -20557,7 +20649,7 @@ ] }, { - "uuid": "3d26eaf1-0a8f-4625-96d7-ac16a5e37d9c", + "uuid": "068b7008-6bc5-46c8-981b-e6e0881b43e1", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -20574,7 +20666,7 @@ ] }, { - "uuid": "5cca4024-6b0c-4e83-a970-e271bc0c5566", + "uuid": "1fad860a-e78e-40df-b671-e089edf7601d", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -20591,7 +20683,7 @@ ] }, { - "uuid": "c8e238d8-780e-4adf-a73f-536bdb4de941", + "uuid": "b25a67b9-ce37-4bcf-8832-9dcfacec8411", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -20608,7 +20700,7 @@ ] }, { - "uuid": "98e50ccd-8996-49bb-a9c2-06f2b23740a5", + "uuid": "31371194-a791-4790-9af0-28f11b1cf3c2", "control-id": "cis_fedora_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -20625,7 +20717,7 @@ ] }, { - "uuid": "4d064000-2163-48d6-b2eb-5704da042563", + "uuid": "a6e8e8ec-9e40-4be6-a475-6a3e964196da", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -20642,7 +20734,7 @@ ] }, { - "uuid": "60090348-6be1-4fb2-96e1-3097679fa60d", + "uuid": "df95057d-cc9a-4492-b2bb-e6255b097610", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -20659,7 +20751,7 @@ ] }, { - "uuid": "9ec15733-0c33-4b0b-bf2f-120abab7e236", + "uuid": "268a6c5c-4c11-4da1-aba1-5c4941930ddc", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -20676,7 +20768,7 @@ ] }, { - "uuid": "df2454f7-0cfb-4c00-8935-9ec27a6dda80", + "uuid": "b6c21791-5f2a-4840-92f2-4092c06fc638", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -20693,7 +20785,7 @@ ] }, { - "uuid": "e73e8de2-319d-4f2c-9140-e0bf3ff1ce16", + "uuid": "54394c2f-3667-4472-8a9a-1afd1076e2f8", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -20710,7 +20802,7 @@ ] }, { - "uuid": "469f87e6-3bcc-42dd-b0a6-c19a19c5d33d", + "uuid": "baa270eb-9f5d-4ff9-8f3f-7e80622150a9", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -20727,7 +20819,7 @@ ] }, { - "uuid": "d8c0c976-8e17-43e4-b606-762a65ef1610", + "uuid": "b7f0e51a-f5d9-482a-bf44-43c3881deb4b", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -20744,7 +20836,7 @@ ] }, { - "uuid": "7fbbd9c4-a9ab-4a27-9f9e-25c47d70c895", + "uuid": "b015cda8-2a84-451a-b8e5-2fa3c48b9675", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -20761,7 +20853,7 @@ ] }, { - "uuid": "81ea6d87-f512-47b5-98cf-ffe001e6b80f", + "uuid": "a1b1966a-fb08-4164-9785-daf9b3248ce7", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -20778,7 +20870,7 @@ ] }, { - "uuid": "fd141c2d-6eff-4428-9a62-f35c0d97f3a3", + "uuid": "a695dead-b843-46d5-a243-5343f9c70819", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -20795,7 +20887,7 @@ ] }, { - "uuid": "3ea56d9e-ac5b-4e27-a44f-b9f15278794b", + "uuid": "2b597910-61e6-4747-a750-07647974d7a2", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -20812,7 +20904,7 @@ ] }, { - "uuid": "58681a76-c64d-4228-968a-f003db86a8d3", + "uuid": "4d9ae243-d5ef-4159-a7b8-55edcdfc5b00", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -20829,7 +20921,7 @@ ] }, { - "uuid": "3c718fd9-2d2b-4aa3-a351-0b229499ae0b", + "uuid": "9d275408-ebe7-4f26-9917-439ccef2c523", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -20846,7 +20938,7 @@ ] }, { - "uuid": "db876635-dfab-4c5b-b84e-132c54d2b884", + "uuid": "c45b7a17-b4d7-4dff-83c5-0776fdb1461b", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -20863,7 +20955,7 @@ ] }, { - "uuid": "c8a584f8-9bc4-48cf-b0b9-e166000da9eb", + "uuid": "5b7e3713-c3ba-4a1e-bcf7-8a6af441ac28", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -20880,7 +20972,7 @@ ] }, { - "uuid": "9139e977-842a-4404-bcc7-de217abd9425", + "uuid": "d4838645-3854-443f-9937-8ad716625945", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -20897,7 +20989,7 @@ ] }, { - "uuid": "6fead76d-9be9-4c89-ad1d-f3570393cb29", + "uuid": "b1c833ad-a7d3-474d-8cba-3f5354cb8945", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -20914,7 +21006,7 @@ ] }, { - "uuid": "c9089fcb-e1e1-498d-8ca6-a76b22a9eea6", + "uuid": "8d344ebf-2bca-4222-9894-92e29ed5fc5f", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -20931,7 +21023,7 @@ ] }, { - "uuid": "2e48baa6-8f77-493c-b378-d8b5f611294f", + "uuid": "8697941d-ff3e-4f91-80c6-e6594e614bf0", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -20948,7 +21040,7 @@ ] }, { - "uuid": "58a92cac-3989-4d79-adec-e4da7827c13f", + "uuid": "0f77746d-2611-483f-870a-206711cf1fd0", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -20965,7 +21057,7 @@ ] }, { - "uuid": "475fd6fd-d4f0-4c1c-b22a-9c9a91eb73cb", + "uuid": "87aa9e79-12eb-491c-8091-48991231f7bf", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -20982,7 +21074,7 @@ ] }, { - "uuid": "26ed707a-2c57-403d-a6c0-03fc7e43b998", + "uuid": "1b078896-f3a0-49e5-ae82-a1581833c59b", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -20999,7 +21091,7 @@ ] }, { - "uuid": "615f4a4b-d142-4e41-8aae-884e6a22937c", + "uuid": "6e1eb551-c240-4a3d-98ca-f005920a328d", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21016,7 +21108,7 @@ ] }, { - "uuid": "07c1d267-d8d3-4461-a2cf-a809edba53b1", + "uuid": "8e01c21b-dff9-4189-88ab-52b9a34316ac", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21033,7 +21125,7 @@ ] }, { - "uuid": "01e782a0-7489-4040-a0a5-aef696e26165", + "uuid": "22ffcd1f-4d44-4074-b571-9f989d13600f", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21050,7 +21142,7 @@ ] }, { - "uuid": "8d9875b1-bdc8-4301-980c-96065a8f7f79", + "uuid": "be6ab877-7bc9-4048-8f6e-102377fa0517", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21067,7 +21159,7 @@ ] }, { - "uuid": "1abb82db-1cac-48b0-96c8-61e8078e05ad", + "uuid": "1913e178-a841-4e69-941c-0ceddb2fa827", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21094,7 +21186,7 @@ ] }, { - "uuid": "db7cf9bc-63c0-4ce1-bdd4-b9784b6aa889", + "uuid": "6193e492-6a30-4f44-81d5-1467e36d6683", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -21107,7 +21199,7 @@ ] }, { - "uuid": "34b96fa9-fc15-4d20-9b29-a54b49efa880", + "uuid": "0a423cc5-80a7-4df7-a47b-c1c17cbbce3f", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -21129,7 +21221,7 @@ ] }, { - "uuid": "acce26b0-c86c-47e5-a9e5-a007fa872a09", + "uuid": "e08f5ae2-dd5e-440b-82de-968be307d9c6", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -21141,7 +21233,7 @@ ] }, { - "uuid": "d5b38fb3-3097-4ed2-991b-117a6d06af3f", + "uuid": "714b6a1e-ed4c-4735-8cc2-6dff4fe47601", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -21154,7 +21246,7 @@ ] }, { - "uuid": "8acfedd3-b8b9-4412-9147-d606d14ab1d1", + "uuid": "844add1f-310a-4504-805c-a1f03b287f82", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -21166,7 +21258,7 @@ ] }, { - "uuid": "12ff37bc-b884-48d6-9074-39cb47a63811", + "uuid": "1ef66365-58e9-46b0-a2e7-a0020cafc568", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -21178,7 +21270,7 @@ ] }, { - "uuid": "54eeb554-6550-4175-ab38-60fa04dd59ff", + "uuid": "8f33afd6-892d-4427-8df4-9e4b964bdf70", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21235,7 +21327,7 @@ ] }, { - "uuid": "c4ba91d3-3e0b-4d06-812d-7cf406fe1d3d", + "uuid": "a162bc91-4d8f-4ccf-8246-872d9bcdf57e", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21262,7 +21354,7 @@ ] }, { - "uuid": "e6983a6c-4ff5-4d8b-844d-cfb8064e568e", + "uuid": "719908fd-621a-45f4-be1d-367f8b96257e", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21289,7 +21381,7 @@ ] }, { - "uuid": "fde9b713-b44c-4a37-906a-e0e476e03a6e", + "uuid": "c87913de-46d0-4e53-b876-516faede1c78", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21306,7 +21398,7 @@ ] }, { - "uuid": "ce3f8fd3-0d46-4bea-80dc-e64da24097f6", + "uuid": "536b39cf-f442-48ce-bdec-8e8c9e56accb", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21323,7 +21415,7 @@ ] }, { - "uuid": "3ddcfbca-1627-4916-97b5-abfd4bb317f2", + "uuid": "146caf29-77c1-472c-a410-5ae9dfd6624d", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21340,7 +21432,7 @@ ] }, { - "uuid": "020de555-576a-46da-8fcd-079afa72b2e7", + "uuid": "45940383-2d51-42d1-89b5-f00c8d294eb0", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -21357,7 +21449,7 @@ ] }, { - "uuid": "4e5c3462-bfd5-484e-8699-1fdc0584bc84", + "uuid": "0b03023a-379d-41a9-a87c-ad3a63629fdd", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -21374,7 +21466,7 @@ ] }, { - "uuid": "d7707da6-cd9a-423c-ade4-e539ecfdee5b", + "uuid": "c34f6c18-2412-4bbb-b1b0-8013b630d8c3", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21396,7 +21488,7 @@ ] }, { - "uuid": "2e65799f-074d-49c3-b96b-347b7f7c229f", + "uuid": "d4f11103-04c7-46d7-ba45-88776b405dbf", "control-id": "cis_fedora_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21413,7 +21505,7 @@ ] }, { - "uuid": "e7a4b6b9-1348-4c82-add3-e48a44689f04", + "uuid": "6f29649e-e2d7-4736-afba-cdc638f8e773", "control-id": "cis_fedora_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21430,7 +21522,7 @@ ] }, { - "uuid": "bf86ee65-8008-4ba2-8b94-7d4bba32b7cb", + "uuid": "592da3ba-257c-442e-bf7c-75b270bde160", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -21447,7 +21539,7 @@ ] }, { - "uuid": "d0f7a4aa-7b06-43f4-881e-6187ca99dd67", + "uuid": "f0d3638a-9dbd-4eb6-b75f-6011e7c54ced", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21464,7 +21556,7 @@ ] }, { - "uuid": "e8b9acf9-f424-428c-b834-2be11d770150", + "uuid": "386e15d2-67dc-434b-baac-015d868fe2a4", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -21481,7 +21573,7 @@ ] }, { - "uuid": "83abca18-85a6-4066-bf0c-1e82834ae6ee", + "uuid": "99a05e76-a4c9-4636-9a2c-1adf9ea9b146", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21498,7 +21590,7 @@ ] }, { - "uuid": "122602ae-8b65-4e02-81c9-0b4c85b812d6", + "uuid": "2adf0de6-8691-4a35-ac15-2227921c1e72", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21515,7 +21607,7 @@ ] }, { - "uuid": "145babe0-29ba-45f6-8193-4bde0ed0dae6", + "uuid": "62b57cba-f7f1-4f7e-aa06-e9f776c9071f", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21532,7 +21624,7 @@ ] }, { - "uuid": "05f7cf77-22d4-40c9-8b0e-07aa8e770d79", + "uuid": "39b6de76-7c0f-4238-b24e-f0c846de8fde", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21549,7 +21641,7 @@ ] }, { - "uuid": "6b957596-5351-4ea5-81f5-a0110e0ab70b", + "uuid": "20b8488f-43fa-417a-ba82-aa1682d4f8b7", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21566,7 +21658,7 @@ ] }, { - "uuid": "6b4abdb9-5c46-461a-ba00-9556613ba46c", + "uuid": "8f92ece0-2039-4857-85d6-d609f4733ca4", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -21583,7 +21675,7 @@ ] }, { - "uuid": "c40c17aa-e6cc-4544-b142-acea4220def4", + "uuid": "7c204b5d-2d81-4445-932f-01bede4c6e63", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -21600,7 +21692,7 @@ ] }, { - "uuid": "692d51e7-41d7-4d3a-9753-1a479490fe19", + "uuid": "36e60882-8131-46b6-b006-4effe229d36d", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -21617,7 +21709,7 @@ ] }, { - "uuid": "e9a68d3f-2621-4b4f-ba91-3391f0df68c1", + "uuid": "347337b2-e313-41ab-ac5e-d666b09c7b3e", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -21634,7 +21726,7 @@ ] }, { - "uuid": "f1c8755e-eff7-4a2e-a709-9c04089f95ea", + "uuid": "3c2bfc6c-9ff6-4b04-8764-efaa39584ce6", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -21651,7 +21743,7 @@ ] }, { - "uuid": "fe1833c2-b6b2-4f9c-9163-f0f409642ed5", + "uuid": "c37a7725-7c9d-4957-9eab-ce7848266732", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -21668,7 +21760,7 @@ ] }, { - "uuid": "19f461e4-8f39-467e-b99f-8030bb1afbf9", + "uuid": "bcf65f8a-34dc-4367-98bd-8c8755face87", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -21685,7 +21777,7 @@ ] }, { - "uuid": "97715fb1-4872-40d7-a301-13cb92038162", + "uuid": "f63cf981-32b5-43ab-833e-d72a9e5a3e2e", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -21702,7 +21794,7 @@ ] }, { - "uuid": "532638bf-fe01-40c8-a33e-06e24189b361", + "uuid": "dfe22909-17e5-44c1-824d-913e4197c29f", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -21724,7 +21816,7 @@ ] }, { - "uuid": "837619af-53ff-4c76-9c4b-8c3faab22441", + "uuid": "75b3e943-78bd-43e4-8d4d-5e85adf0dc5b", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -21737,7 +21829,7 @@ ] }, { - "uuid": "5a267762-e62c-43a5-8298-28f46d352fd6", + "uuid": "efb912e5-013c-4d8e-a85d-cc406f21f221", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -21750,7 +21842,7 @@ ] }, { - "uuid": "78f1ad1a-38b0-4de4-bf30-5ada61c25d46", + "uuid": "d5febf83-81ce-4942-8627-8d21805c954e", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -21768,7 +21860,7 @@ ] }, { - "uuid": "210f79d1-5547-43f8-b394-f71840147463", + "uuid": "2958862c-6aa8-4746-9252-5d6f5d1febd1", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -21785,7 +21877,7 @@ ] }, { - "uuid": "d68fce24-dc96-498f-a3ac-20cf86359ebd", + "uuid": "9f34a45a-ad0d-4954-836c-a3a269c75b92", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -21807,7 +21899,7 @@ ] }, { - "uuid": "8c8bad29-7307-4a6e-9455-b018145e3356", + "uuid": "d334a6a5-4c8f-4712-9c2d-315a49448080", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -21834,7 +21926,7 @@ ] }, { - "uuid": "6a05c2c6-2903-4063-bf6e-aaab10c96d29", + "uuid": "bd983b4c-3a2e-4760-8a29-b72888c9011d", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -21846,7 +21938,7 @@ ] }, { - "uuid": "ee581e06-5984-4d8b-932f-86f6818f5ae6", + "uuid": "79665c74-8cd3-4c46-a97c-c6ef29885458", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -21863,7 +21955,7 @@ ] }, { - "uuid": "9d81b326-a11d-4992-8f50-c31354662ca4", + "uuid": "a0840604-9860-43be-9730-3fa5dd2e03c7", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -21880,7 +21972,7 @@ ] }, { - "uuid": "321fb65e-79b7-436b-aa6f-79f5cf10ca2d", + "uuid": "ac98c553-7796-4964-b823-ea12afad4248", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -21897,7 +21989,7 @@ ] }, { - "uuid": "63e12883-bd00-4688-9d24-05c429e05662", + "uuid": "899b19c3-12a2-4faf-969f-62607497b7d3", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -21914,7 +22006,7 @@ ] }, { - "uuid": "ebcd74f1-f1d8-4753-9284-654ecf52ba15", + "uuid": "cc746599-ff5c-4832-97b3-ed4784149c32", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -21931,7 +22023,7 @@ ] }, { - "uuid": "7c5babab-bcb8-4b7b-913d-1d68b8e79073", + "uuid": "24345465-af6e-49c8-8b09-12ea65c03f06", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -21948,7 +22040,7 @@ ] }, { - "uuid": "96da9653-8ee5-4a51-92aa-9a54ef4cf46a", + "uuid": "0da1d94f-42db-46b7-92bc-691d8159f6ed", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -21965,7 +22057,7 @@ ] }, { - "uuid": "ce21f7b2-6e69-420c-b6bc-92b62635457a", + "uuid": "48a681fd-f9b7-4557-9a74-bb233c57e0b9", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -21982,7 +22074,7 @@ ] }, { - "uuid": "8794d806-32de-48f8-a68c-14ab7d4b6674", + "uuid": "1c0aaeb8-b5ee-4f11-bf13-18b09414be27", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -21999,7 +22091,7 @@ ] }, { - "uuid": "060812db-2745-4e16-a993-cf6b52e89700", + "uuid": "78a396ff-a76a-4466-8ab8-136f90eca3ef", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -22016,7 +22108,7 @@ ] }, { - "uuid": "dc778a0b-6dba-4391-a859-f38b8d445086", + "uuid": "a3d20ad9-c891-4076-8488-7416e4767255", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22038,7 +22130,7 @@ ] }, { - "uuid": "244998ea-e9a4-45b4-8939-1a076dc4077c", + "uuid": "045a8ca5-7a6b-48cf-967e-58a4af0e6046", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -22051,7 +22143,7 @@ ] }, { - "uuid": "9f987ce8-3e57-499d-8d2f-fe96750ae9e9", + "uuid": "1589fe6b-7bfb-4b82-a9e6-ffc46b384ebe", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22068,7 +22160,7 @@ ] }, { - "uuid": "ccca8d81-ce40-482d-ae04-bcb13c2443e1", + "uuid": "d4823649-44c9-4eac-88bc-47a78313eb3d", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -22085,7 +22177,7 @@ ] }, { - "uuid": "e5bf81a1-b0b7-48d4-81b3-022ca12d1df8", + "uuid": "c6e10fb1-af68-4154-97ee-2ef4bd27b10d", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22102,7 +22194,7 @@ ] }, { - "uuid": "05a4c8fb-b142-48b2-80dc-5e6e05e13bcf", + "uuid": "39be2c4b-b6f9-44e2-831b-1b9b2ca16b75", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22124,7 +22216,7 @@ ] }, { - "uuid": "0a99589e-d48a-4faf-8dbc-27dad575a5de", + "uuid": "7e584bc5-8e90-4e44-93c0-24ee97994415", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -22141,7 +22233,7 @@ ] }, { - "uuid": "23e3213b-daab-40cc-a07b-f043ce763430", + "uuid": "60829f4c-0947-443e-9c5c-b34c81df12e8", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22163,7 +22255,7 @@ ] }, { - "uuid": "507b2d70-7f03-4277-a388-fce6634cbc51", + "uuid": "85e9749a-21cc-4dab-8471-a493ecdeeee8", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22185,7 +22277,7 @@ ] }, { - "uuid": "727cd61b-8c74-41e6-9afa-6637af46af86", + "uuid": "7a1a2281-27a2-4be6-a8be-ae3d6f00ab77", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -22202,7 +22294,7 @@ ] }, { - "uuid": "aa492f43-d341-4d62-8612-9b2d13c3bcfe", + "uuid": "c22c02c8-39f0-4b87-972c-376e50f56f9e", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22224,7 +22316,7 @@ ] }, { - "uuid": "eb866925-9c64-468b-be5c-0728efccbd9d", + "uuid": "be0a1376-0cb9-4e99-aea3-0a2b3dfa94b2", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22241,7 +22333,7 @@ ] }, { - "uuid": "50a947f5-339d-44c5-9a8d-f8a2a091eaec", + "uuid": "23c5f83f-389b-41ef-9858-0e9ae9c3b894", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22258,7 +22350,7 @@ ] }, { - "uuid": "bfcbf3cb-387d-438b-b4b4-211a8913c075", + "uuid": "07d426a1-43c3-4ea3-a0cb-bbe4a7648f67", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22275,7 +22367,7 @@ ] }, { - "uuid": "d9805018-9f95-4d28-ad99-5f7cd72d1135", + "uuid": "651feadd-a1e6-4b56-93a3-2a2531f7b24f", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22292,7 +22384,7 @@ ] }, { - "uuid": "147fe899-df43-45a3-9ceb-b5309afbc861", + "uuid": "6ac25fdb-bfb9-4652-a114-ff298947a772", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22309,7 +22401,7 @@ ] }, { - "uuid": "af3b2ca9-7988-438c-905d-dd2f72bb4544", + "uuid": "d50b0c44-6237-4abf-9e03-27c7095ac4a3", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22331,7 +22423,7 @@ ] }, { - "uuid": "e24a31fa-ff4f-4b17-ab8c-8b3dc7080605", + "uuid": "9220c0c9-b577-433e-8fe8-ac2573956e01", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22348,7 +22440,7 @@ ] }, { - "uuid": "7da9b066-1cac-49dd-aaed-a7c87d9cffcd", + "uuid": "7e3c29bc-6d62-4ab4-9def-880604f31e5b", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22370,7 +22462,7 @@ ] }, { - "uuid": "c2013f1c-6f86-4335-8c0f-1f9000ddd4b7", + "uuid": "0b9ebd5b-cf9e-49ea-96a5-0a9878ae276f", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22387,7 +22479,7 @@ ] }, { - "uuid": "77186202-1201-4bbf-b7b5-d086dca962d8", + "uuid": "bf4069f8-f1eb-45b9-9f5c-0b916b7ec426", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22404,7 +22496,7 @@ ] }, { - "uuid": "b2dd1fc2-f9b8-4181-b9a5-2a50e2d150f6", + "uuid": "0ad053f3-235a-4406-9fe7-fc4a8a6457b8", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22431,7 +22523,7 @@ ] }, { - "uuid": "684af56a-fa85-4a2a-a32e-770e5c821bfc", + "uuid": "2a9e6e33-7a40-44b8-9b27-e9ec59bebf65", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22453,7 +22545,7 @@ ] }, { - "uuid": "0c13a163-de4f-40ec-ba51-560f8181224d", + "uuid": "c60c621e-9897-4986-aec3-b5531de3465e", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22470,7 +22562,7 @@ ] }, { - "uuid": "5913f46a-0106-47eb-b86b-ed27e8c980fb", + "uuid": "286a6c18-172f-4828-98f6-6c7777a47144", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22487,7 +22579,7 @@ ] }, { - "uuid": "d5825ead-b653-4b54-b306-5279e3bfd21f", + "uuid": "b39ce7ed-70ff-4c1e-9d6e-deed0b2628ac", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22504,7 +22596,7 @@ ] }, { - "uuid": "595a1983-7a17-4073-bcbe-6da599bc5968", + "uuid": "f13dc2ee-7a4c-4521-9681-e4110ca20888", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -22517,7 +22609,7 @@ ] }, { - "uuid": "80b9e9c7-24c6-42b2-98ce-e802a33cba59", + "uuid": "8e6e0e15-49e0-40f2-a01f-ae3bb4829c2c", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -22530,7 +22622,7 @@ ] }, { - "uuid": "2c9f48ac-1f06-4278-be1a-3d5b48309407", + "uuid": "a5de0405-2e19-4450-b611-acb075984e3f", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -22547,7 +22639,7 @@ ] }, { - "uuid": "628d981b-e235-4431-bb37-7fcacb62a749", + "uuid": "f12e940d-b3f3-4c6e-80a1-349200bd3fb3", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22564,7 +22656,7 @@ ] }, { - "uuid": "90c9bdaf-c8c0-4ad9-adfb-dea31fe15b06", + "uuid": "ab14d757-70b6-4b85-8154-9035ca507494", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -22577,7 +22669,7 @@ ] }, { - "uuid": "49c940ec-4427-42d1-8d68-920378acf9dc", + "uuid": "e28dfc8b-d8f1-4471-b8f9-4852b7c42892", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22594,7 +22686,7 @@ ] }, { - "uuid": "3c324b5d-e529-46c7-8fb9-2d601f0f021a", + "uuid": "23d1deb5-7143-463e-93d5-7008c03771e3", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22611,7 +22703,7 @@ ] }, { - "uuid": "ac90f017-e02e-4415-b6c4-bfa54c57c10c", + "uuid": "77cb171e-b9f1-4b3e-8339-4ba1a24bcbf4", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -22628,7 +22720,7 @@ ] }, { - "uuid": "b597f748-6d61-4773-a6e0-0414ca9c3079", + "uuid": "89ece79d-4f56-4bf5-be78-f4bbd1591848", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -22645,7 +22737,7 @@ ] }, { - "uuid": "c1c0ca5b-35ca-48ba-b2d1-513e63f60e38", + "uuid": "2d4cb2d9-3938-4fa5-b581-24761b922405", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -22662,7 +22754,7 @@ ] }, { - "uuid": "2dffabff-21a3-424c-bc24-55c041c4a0ac", + "uuid": "59a8700c-b173-4d26-b0e2-64a2b685ebe3", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -22674,7 +22766,7 @@ ] }, { - "uuid": "3e33130d-0656-4e76-8735-ff1209e135fd", + "uuid": "b08c42e2-ec7a-4503-a9a8-bebeacd53505", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -22686,7 +22778,7 @@ ] }, { - "uuid": "2259e09a-135b-465f-a54b-1c7ebad99516", + "uuid": "5fbd2a90-317e-40c7-a3cd-f684afc0202b", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -22698,7 +22790,7 @@ ] }, { - "uuid": "0c62653d-86d6-48e2-a43e-1877bd416958", + "uuid": "37e4d85f-227a-4f8d-ab47-d2f42691556d", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -22710,7 +22802,7 @@ ] }, { - "uuid": "d5714f34-f602-4dab-b331-58875dbb9eef", + "uuid": "54c32e85-b2d6-40e8-b930-1827b684bc2c", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -22723,7 +22815,7 @@ ] }, { - "uuid": "a0ec7c1b-fec7-40f3-8505-9bda3354515f", + "uuid": "7f0c40be-000c-4297-93d3-08bebf792858", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -22736,7 +22828,7 @@ ] }, { - "uuid": "28a7407d-759b-44c6-895d-62213aafa374", + "uuid": "9223f722-d4ab-4278-a7cd-c47d51774558", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -22748,7 +22840,7 @@ ] }, { - "uuid": "921996b4-017f-454d-9c51-8831efbc3e32", + "uuid": "7e513c7f-bcf8-4abf-8cbf-100b254f810f", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -22761,7 +22853,7 @@ ] }, { - "uuid": "33302c0a-d086-4ea4-b231-55d10ce34d5a", + "uuid": "65b55853-25df-4040-87f8-083b3d4ad18d", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -22788,7 +22880,7 @@ ] }, { - "uuid": "33a8ab9e-2ef9-40d0-b4a6-ebb73c82f437", + "uuid": "86180493-8450-4006-8d3c-194361b50f3f", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -22815,7 +22907,7 @@ ] }, { - "uuid": "86f286ad-c847-4038-bbe8-dd65e488760b", + "uuid": "3b08938a-f30a-4e72-bbc0-bdd67d6f60ac", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -22842,7 +22934,7 @@ ] }, { - "uuid": "c6e00a2c-efb4-402a-b94e-4dcdd6feda4d", + "uuid": "721525e9-5678-4601-b16f-57cb8bf96f16", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -22869,7 +22961,7 @@ ] }, { - "uuid": "5b961db1-5152-4d4e-9444-077246b43e19", + "uuid": "07266b07-e8ee-48d8-97df-f045d2a0bb59", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -22896,7 +22988,7 @@ ] }, { - "uuid": "e7922a50-75de-45a0-b252-15ffd5b02e19", + "uuid": "7205ea10-0416-4819-b57d-fc36f54a6b9d", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -22923,7 +23015,7 @@ ] }, { - "uuid": "0eaf7d24-c884-4356-9619-56279222b3bd", + "uuid": "9681d134-4bd3-42e5-a194-db256c3c7bc7", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -22950,7 +23042,7 @@ ] }, { - "uuid": "11b4c78a-4ae6-472b-a614-94cbc9ce2f5e", + "uuid": "f6186c86-c50c-4aaf-9585-6adc51a68733", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -22977,7 +23069,7 @@ ] }, { - "uuid": "1b172b73-bb14-4577-92fd-008f2ed07fd9", + "uuid": "bd78c7f4-d94a-47f1-9ace-884803d7b57f", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23004,7 +23096,7 @@ ] }, { - "uuid": "2d598930-fee8-469f-a1a5-9aa26fe05d7e", + "uuid": "56c368c8-8b8c-4f8a-a1f2-43532614ef72", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23031,7 +23123,7 @@ ] }, { - "uuid": "ced44cf8-1ac7-4b51-a13d-9dbae076197f", + "uuid": "fe1112e3-548d-486e-86e0-b15019cefc1e", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23073,7 +23165,7 @@ ] }, { - "uuid": "e762a572-9701-4022-9db8-56cd3addd962", + "uuid": "0eac84f0-726f-4125-af77-7a832781082b", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23095,7 +23187,7 @@ ] }, { - "uuid": "2cfc43c6-7665-44c4-8d6c-f897a999b321", + "uuid": "52f9e6fd-f5f8-4cf3-a15d-a6900e2afab9", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23117,7 +23209,7 @@ ] }, { - "uuid": "40d2b4e3-b2ca-460a-9fa3-9add43cce26f", + "uuid": "51eaea0a-50ff-44be-9230-8d2832890606", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -23130,7 +23222,7 @@ ] }, { - "uuid": "37429699-5291-434b-9f9b-d5ef9feedf66", + "uuid": "fb36b02d-7697-4175-b5e5-934da0bab652", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23147,7 +23239,7 @@ ] }, { - "uuid": "e839ee00-e83b-431d-b81f-a930a811eafc", + "uuid": "373fa833-8939-4b85-83d0-7c80a8b80bda", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23164,7 +23256,7 @@ ] }, { - "uuid": "55faa137-2063-4fdc-96c1-7e7eacd4c290", + "uuid": "b7c34ef8-c756-4c46-82c0-79ac9171990d", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23181,7 +23273,7 @@ ] }, { - "uuid": "0a452aca-9ee4-4efa-b7af-b24f8a7d2a06", + "uuid": "5a566a04-e757-446b-a5e9-11755d2b78da", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23198,7 +23290,7 @@ ] }, { - "uuid": "efb81284-0584-4f0d-b5c0-cc6a50083207", + "uuid": "ba4403ff-7810-4365-9e6b-3bec431102a3", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23215,7 +23307,7 @@ ] }, { - "uuid": "b851b3ac-e448-49fc-ad9f-5a0920938a3a", + "uuid": "3d49a9fe-eb34-4788-a6e1-358671e21962", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23232,7 +23324,7 @@ ] }, { - "uuid": "1e170b2a-cc8f-4ab1-b67c-0bcc13698fbb", + "uuid": "a34e63ca-bd3a-4a96-9edf-9a6da9f243f9", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23249,7 +23341,7 @@ ] }, { - "uuid": "9bec4a98-61e9-4b72-82b3-8fa6067f0f5e", + "uuid": "50016e9f-197a-43bc-a6a5-cc78e2ccd80f", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23276,7 +23368,7 @@ ] }, { - "uuid": "f2e5719d-2003-4f8d-a9be-56462f9d8213", + "uuid": "593937ff-eb8c-4f68-b7ba-3230aac63511", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json index f694fba84..580598cf0 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "76afcd42-7a9d-433c-b495-ef156395719c", "metadata": { "title": "Component definition for fedora", - "last-modified": "2026-02-12T10:36:24.196411+00:00", - "version": "2.0", + "last-modified": "2026-03-27T01:41:46.051665+00:00", + "version": "2.1", "oscal-version": "1.1.3" }, "components": [ @@ -47,103 +47,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -155,67 +155,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -227,13 +227,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -245,13 +245,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -263,31 +263,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -299,49 +299,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -353,13 +353,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -371,31 +371,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -407,13 +407,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -425,13 +425,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -443,13 +443,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -461,13 +461,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -479,13 +479,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -497,13 +497,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -515,427 +515,427 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_minimum_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum age of password in days", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_minimum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Minimum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_dir", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The directory where the user files with the failure records are kept", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_dir", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "The directory where the user files with the failure records are kept", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_audit_backlog_limit", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 8192, 8192: 8192}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_admin_space_left_action", + "value": "var_audit_backlog_limit", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", + "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", + "value": "{'default': 8192, 8192: 8192}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_error_action", + "value": "var_auditd_admin_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", + "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_full_action", + "value": "var_auditd_disk_error_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file", + "value": "var_auditd_disk_full_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file in /etc/audit/auditd.conf", + "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file_action", + "value": "var_auditd_max_log_file", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", + "value": "The setting for max_log_file in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", + "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_space_left_action", + "value": "var_auditd_max_log_file_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for space_left_action in /etc/audit/auditd.conf", + "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", + "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_auditd_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "The setting for space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -947,252 +947,270 @@ { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_postfix_inet_interfaces", + "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { "name": "Parameter_Description_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for inet_interfaces in /etc/postfix/main.cf", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", + "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_screensaver_lock_delay", + "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { "name": "Parameter_Description_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", + "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", + "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_policy_name", + "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { "name": "Parameter_Description_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", + "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_state", + "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { "name": "Parameter_Description_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", + "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'enforcing', 'disabled': 'disabled', 'enforcing': 'enforcing', 'permissive': 'permissive'}", + "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_max_sessions", + "value": "var_selinux_state", "remarks": "rule_set_000" }, { "name": "Parameter_Description_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of open sessions permitted.", + "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", + "value": "{'default': 'enforcing', 'disabled': 'disabled', 'enforcing': 'enforcing', 'permissive': 'permissive'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_keepalive", + "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Description_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of idle message counts before session is terminated.", + "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", + "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_login_grace_time", + "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { "name": "Parameter_Description_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", + "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 60, 60: 60}", + "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_maxstartups", + "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", + "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", + "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sudo_timestamp_timeout", + "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { "name": "Parameter_Description_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", + "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_user_initialization_files_regex", + "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_65", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_user_initialization_files_regex", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_65", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_65", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" }, @@ -1535,4903 +1553,4915 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "disable_weak_deps", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_setroubleshoot_removed", + "value": "package_mcstrans_removed", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall setroubleshoot Package", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_setroubleshoot_removed", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall setroubleshoot Package", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "banner_etc_issue_cis", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_owner_etc_motd", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_permissions_etc_motd", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_owner_etc_issue", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "file_permissions_etc_issue", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_avahi-daemon_disabled", + "value": "service_autofs_disabled", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Avahi Server Software", + "value": "Disable the Automounter", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "service_avahi-daemon_disabled", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Disable Avahi Server Software", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_kea_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall kea Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_bind_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall bind Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "package_dnsmasq_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cups_disabled", + "value": "service_nfs_disabled", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the CUPS Service", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "service_cups_disabled", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Disable the CUPS Service", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_rsync_removed", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall rsync Package", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_samba_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall Samba Package", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_net-snmp_removed", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "package_squid_removed", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Uninstall squid Package", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_httpd_removed", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_nginx_removed", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Uninstall nginx Package", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_ftp_removed", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Remove ftp Package", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet_removed", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Remove telnet Clients", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "package_tftp_removed", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Remove tftp Daemon", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "package_cron_installed", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "service_crond_enabled", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Enable cron Service", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_groupowner_crontab", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_owner_crontab", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Owner on crontab", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_permissions_crontab", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Permissions on crontab", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_owner_cron_hourly", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", + "value": "file_owner_cron_daily", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.weekly", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_weekly", + "value": "file_owner_cron_weekly", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.weekly", + "value": "Verify Owner on cron.weekly", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_monthly", + "value": "file_permissions_cron_weekly", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.monthly", + "value": "Verify Permissions on cron.weekly", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_monthly", + "value": "file_groupowner_cron_monthly", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.monthly", + "value": "Verify Group Who Owns cron.monthly", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_monthly", + "value": "file_owner_cron_monthly", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.monthly", + "value": "Verify Owner on cron.monthly", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_yearly", + "value": "file_permissions_cron_monthly", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.yearly", + "value": "Verify Permissions on cron.monthly", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_yearly", + "value": "file_groupowner_cron_yearly", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.yearly", + "value": "Verify Group Who Owns cron.yearly", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_yearly", + "value": "file_owner_cron_yearly", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.yearly", + "value": "Verify Owner on cron.yearly", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_d", + "value": "file_permissions_cron_yearly", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.d", + "value": "Verify Permissions on cron.yearly", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_d", + "value": "file_groupowner_cron_d", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.d", + "value": "Verify Group Who Owns cron.d", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_d", + "value": "file_owner_cron_d", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.d", + "value": "Verify Owner on cron.d", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_deny_not_exist", + "value": "file_permissions_cron_d", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.deny does not exist", + "value": "Verify Permissions on cron.d", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_allow_exists", + "value": "file_cron_deny_not_exist", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.allow exists", + "value": "Ensure that /etc/cron.deny does not exist", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_allow", + "value": "file_cron_allow_exists", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/cron.allow file", + "value": "Ensure that /etc/cron.allow exists", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_allow", + "value": "file_groupowner_cron_allow", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/cron.allow file", + "value": "Verify Group Who Owns /etc/cron.allow file", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_allow", + "value": "file_owner_cron_allow", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/cron.allow file", + "value": "Verify User Who Owns /etc/cron.allow file", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_deny_not_exist", + "value": "file_permissions_cron_allow", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.deny does not exist", + "value": "Verify Permissions on /etc/cron.allow file", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_allow_exists", + "value": "file_at_deny_not_exist", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.allow exists", + "value": "Ensure that /etc/at.deny does not exist", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_at_allow", + "value": "file_at_allow_exists", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/at.allow file", + "value": "Ensure that /etc/at.allow exists", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_at_allow", + "value": "file_groupowner_at_allow", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/at.allow file", + "value": "Verify Group Who Owns /etc/at.allow file", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_at_allow", + "value": "file_owner_at_allow", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/at.allow file", + "value": "Verify User Who Owns /etc/at.allow file", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "wireless_disable_interfaces", + "value": "file_permissions_at_allow", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Deactivate Wireless Network Interfaces", + "value": "Verify Permissions on /etc/at.allow file", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_bluetooth_disabled", + "value": "wireless_disable_interfaces", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Bluetooth Service", + "value": "Deactivate Wireless Network Interfaces", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_atm_disabled", + "value": "service_bluetooth_disabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ATM Support", + "value": "Disable Bluetooth Service", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_can_disabled", + "value": "kernel_module_atm_disabled", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable CAN Support", + "value": "Disable ATM Support", "remarks": "rule_set_136" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "kernel_module_can_disabled", + "remarks": "rule_set_137" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Disable CAN Support", + "remarks": "rule_set_137" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_var_lib_selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in /var/lib/selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_create", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - create_module", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_433" + "remarks": "rule_set_434" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_435" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_434" + "remarks": "rule_set_435" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_436" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_435" + "remarks": "rule_set_436" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_437" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_436" + "remarks": "rule_set_437" } ], "control-implementations": [ { - "uuid": "e86239ce-49d6-4c3a-810c-e6faeb889f12", + "uuid": "9c858efb-4d50-4429-a7cf-1db13b7eaf1f", "source": "trestle://profiles/fedora-cis_fedora-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -6449,17 +6479,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -6835,7 +6871,7 @@ ], "implemented-requirements": [ { - "uuid": "3b2590dc-f32d-4b5b-9013-a98f05412551", + "uuid": "ea83efc9-321f-4b73-8431-32f529e802f1", "control-id": "cis_fedora_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6852,7 +6888,7 @@ ] }, { - "uuid": "6d3d3e8b-b4a6-46a7-9e7d-01a07035d9b2", + "uuid": "261c23a8-f09b-437c-ae1e-30695e9b6c04", "control-id": "cis_fedora_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6869,7 +6905,7 @@ ] }, { - "uuid": "c491b348-dc37-4e1e-bf71-384947181ded", + "uuid": "a5f3e748-b1e7-4f2c-8a42-6039c02069a2", "control-id": "cis_fedora_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6886,7 +6922,7 @@ ] }, { - "uuid": "4bdc4469-2b1b-4e8b-80a0-5d800637d4d2", + "uuid": "ea047023-2b02-4cdc-b611-3031818ae982", "control-id": "cis_fedora_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6903,7 +6939,7 @@ ] }, { - "uuid": "ad6df107-04bf-4fc1-a4dd-7a5acfe7ff50", + "uuid": "de7de17e-37db-49b2-a628-6f25ee2605db", "control-id": "cis_fedora_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6920,7 +6956,7 @@ ] }, { - "uuid": "47036f17-93ae-4d52-b89f-e58bdb4f3bcc", + "uuid": "f0cb7e56-4eec-4436-b245-83aa103fe843", "control-id": "cis_fedora_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6937,7 +6973,7 @@ ] }, { - "uuid": "dbd049f6-9943-4b02-b08f-258a29ad6442", + "uuid": "91a2226e-a5e8-45d5-a261-f1e9ab49274e", "control-id": "cis_fedora_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6954,7 +6990,7 @@ ] }, { - "uuid": "61ffbdb7-6adc-4308-8227-a61d79de8f5b", + "uuid": "6e614098-ff7d-49fe-ad29-834f7027579f", "control-id": "cis_fedora_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -6971,7 +7007,7 @@ ] }, { - "uuid": "e362ceff-961e-404a-9057-8340906b31a0", + "uuid": "34aaab4b-c400-46cf-9cae-b2e35b8e5f21", "control-id": "cis_fedora_1-2.1.3", "description": "The description for control-id cis_fedora_1-2.1.3.", "props": [ @@ -6984,7 +7020,7 @@ ] }, { - "uuid": "cd9176fc-87d9-446a-9eb0-61688599a8e7", + "uuid": "5785bd4d-1749-4842-9e65-9075593358b7", "control-id": "cis_fedora_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7001,7 +7037,7 @@ ] }, { - "uuid": "f9f49846-82f3-412b-bd6e-46c9c87f5808", + "uuid": "e01fc54e-2621-437b-bcbb-5456eb5467a8", "control-id": "cis_fedora_1-3.1.6", "description": "The description for control-id cis_fedora_1-3.1.6.", "props": [ @@ -7014,7 +7050,7 @@ ] }, { - "uuid": "a32ed988-35a1-4625-b4ed-403b69b39c19", + "uuid": "ba143676-1a66-4fcb-9d0b-8f4750f1d419", "control-id": "cis_fedora_1-8.7", "description": "No notes for control-id 1.8.7.", "props": [ @@ -7031,7 +7067,7 @@ ] }, { - "uuid": "20493227-569d-424e-9764-a5d6f5b464d0", + "uuid": "7e5c2407-bd11-4204-a9ad-665a8ed2a61b", "control-id": "cis_fedora_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7048,7 +7084,7 @@ ] }, { - "uuid": "b25b3849-169a-4e7f-bb1d-7cd983ff0845", + "uuid": "f5c0324c-a4d3-4bd4-ac40-21f34564d9f2", "control-id": "cis_fedora_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -7065,7 +7101,7 @@ ] }, { - "uuid": "e845d687-9b18-4816-a8e7-3252360ae4e3", + "uuid": "d15b80fd-9c8e-4114-a0bb-0a75deac6e91", "control-id": "cis_fedora_2-1.22", "description": "No notes for control-id 2.1.22.", "props": [ @@ -7082,7 +7118,7 @@ ] }, { - "uuid": "3f19b30d-2918-4fa1-8b81-c286a7baa734", + "uuid": "f8aae8ef-b37b-4611-941b-62e33016c184", "control-id": "cis_fedora_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7099,7 +7135,7 @@ ] }, { - "uuid": "3a86fcd8-13d1-4233-942c-1ceb5211bf07", + "uuid": "4446cfcf-9ff7-402d-82e3-764023736c50", "control-id": "cis_fedora_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7116,7 +7152,7 @@ ] }, { - "uuid": "f817aeaf-24bb-458f-93ca-56a57301fdfd", + "uuid": "4b813bad-f293-42bc-b349-39257d0a223a", "control-id": "cis_fedora_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7133,7 +7169,7 @@ ] }, { - "uuid": "94bae309-94a5-441d-a9fd-4c6fd4506783", + "uuid": "bd46b070-282e-4089-be30-1fad61cc52a0", "control-id": "cis_fedora_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -7150,7 +7186,7 @@ ] }, { - "uuid": "16d3c299-91d5-4b6e-b8ea-a42b09fe6a07", + "uuid": "da314971-f426-4dcc-9f66-c6ad498b60c4", "control-id": "cis_fedora_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -7167,7 +7203,7 @@ ] }, { - "uuid": "360f9614-30ad-4760-98cf-65fbf391bf28", + "uuid": "76173bac-409f-4a02-a810-a0411070d7ca", "control-id": "cis_fedora_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7184,7 +7220,7 @@ ] }, { - "uuid": "405a176b-8bad-4f5e-bf62-8df21a306627", + "uuid": "c2424a9e-085a-4d84-a688-10ba10af7338", "control-id": "cis_fedora_5-3.3.1.3", "description": "No notes for control-id 5.3.3.1.3.", "props": [ @@ -7201,7 +7237,7 @@ ] }, { - "uuid": "7074629c-b533-437f-ad27-dc23fd447625", + "uuid": "bf4336c1-444e-48e0-bc35-86c940c276c0", "control-id": "cis_fedora_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7223,7 +7259,7 @@ ] }, { - "uuid": "93ff826b-3abf-4c4f-a8b9-fe343d785ad3", + "uuid": "257f0054-00e5-4e70-a20a-85d7e3275479", "control-id": "cis_fedora_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7240,7 +7276,7 @@ ] }, { - "uuid": "4b9b6e45-6bfd-434c-8507-e0346c437cd0", + "uuid": "e2a3767b-f3a7-4042-b181-ed7887b8d4e0", "control-id": "cis_fedora_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7262,7 +7298,7 @@ ] }, { - "uuid": "2a2d0fa7-c3e4-40d6-b128-b3a5277cf14d", + "uuid": "70b114d8-f643-4ba6-ac50-1fc0b05411bf", "control-id": "cis_fedora_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7279,7 +7315,7 @@ ] }, { - "uuid": "28aaf6a1-2605-4008-b0a0-c127072bc158", + "uuid": "80435636-7287-4a31-95d6-757a89cc125f", "control-id": "cis_fedora_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7296,7 +7332,7 @@ ] }, { - "uuid": "341b6af8-f1bd-4a68-9526-c99c29bf22cc", + "uuid": "bf0cb198-9688-40bf-bdc0-b55d2fb2c197", "control-id": "cis_fedora_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7313,7 +7349,7 @@ ] }, { - "uuid": "476134fb-41d1-4e20-8389-2f0d1a92ad75", + "uuid": "13b92929-0a2c-433a-84ac-e7f0fb156798", "control-id": "cis_fedora_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7330,7 +7366,7 @@ ] }, { - "uuid": "f38d8e5f-90c6-4b16-b4f4-aae2df040744", + "uuid": "647e573e-38e9-474f-8691-03657d1eff7b", "control-id": "cis_fedora_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7347,7 +7383,7 @@ ] }, { - "uuid": "a81dc85f-be04-485e-9814-b50f423ce6ff", + "uuid": "777981c6-fc53-4405-8e38-3196c691c1e2", "control-id": "cis_fedora_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7369,7 +7405,7 @@ ] }, { - "uuid": "3f6dc106-1b9d-4c32-83ef-4f718432080f", + "uuid": "0acd92fa-6050-4cab-a28f-16805f7863e0", "control-id": "cis_fedora_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7391,7 +7427,7 @@ ] }, { - "uuid": "57ad9d2d-c06a-42f1-98e6-ffe349754817", + "uuid": "bd3b60f6-7b99-4875-8ce4-f3affdcb1638", "control-id": "cis_fedora_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7408,7 +7444,7 @@ ] }, { - "uuid": "d4713cf2-8490-48b9-97e6-b354e351b08c", + "uuid": "876822ce-b147-467b-b305-9720be01781c", "control-id": "cis_fedora_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7425,7 +7461,7 @@ ] }, { - "uuid": "a9aa8e84-2c35-4ede-89e8-b44adb2a0d55", + "uuid": "4fbe412b-bd67-4ce0-946c-65696ba75a7d", "control-id": "cis_fedora_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7442,7 +7478,7 @@ ] }, { - "uuid": "05192984-39e7-4944-a4e7-297f4303175f", + "uuid": "f4417418-e11b-4a5d-8d6a-5febcf9b86ce", "control-id": "cis_fedora_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7474,7 +7510,7 @@ ] }, { - "uuid": "427cfe38-10cf-47be-bee4-862190aadbc6", + "uuid": "d055b70e-83af-4a0f-b813-03164bee345e", "control-id": "cis_fedora_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7496,7 +7532,7 @@ ] }, { - "uuid": "684d5f1c-ccb2-4f85-8dec-f60856484a28", + "uuid": "9d118514-1c8c-4d33-9d55-df68359eca04", "control-id": "cis_fedora_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7518,7 +7554,7 @@ ] }, { - "uuid": "75a1a160-5778-4fe5-8705-13fd92f6661c", + "uuid": "9861aacf-8c1c-4168-b0e3-abdfffd95c6d", "control-id": "cis_fedora_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7540,7 +7576,7 @@ ] }, { - "uuid": "6ae99ea5-7251-46d7-bc0c-8e9dbd26ff42", + "uuid": "bd925163-7e07-40ad-9c27-413dadbb3122", "control-id": "cis_fedora_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7562,7 +7598,7 @@ ] }, { - "uuid": "7da9ce2b-be35-4e86-9d47-aa62951f75d2", + "uuid": "3362b971-b730-4c2b-8600-59cacf3f5c97", "control-id": "cis_fedora_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7579,7 +7615,7 @@ ] }, { - "uuid": "0502eb54-6ac3-4d28-a13f-51264656579b", + "uuid": "abafb433-f337-49f9-8759-71047bff10fe", "control-id": "cis_fedora_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7596,7 +7632,7 @@ ] }, { - "uuid": "74deee76-4d0b-4409-96d5-96aaf61af558", + "uuid": "58def145-e814-4c60-8bbe-4554d32890c3", "control-id": "cis_fedora_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7633,7 +7669,7 @@ ] }, { - "uuid": "706a3a46-730f-48b9-b4c8-daca641e2d36", + "uuid": "6272dd89-d466-439e-a9b0-2e9f48ebc825", "control-id": "cis_fedora_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7650,7 +7686,7 @@ ] }, { - "uuid": "59934e9e-cc1b-45e6-9002-cdbf43ab41e4", + "uuid": "eea512e1-b9dd-4a95-a006-132861e500c1", "control-id": "cis_fedora_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7667,7 +7703,7 @@ ] }, { - "uuid": "53d89f88-1a4c-4a8f-b676-11d69e82c9b0", + "uuid": "e0abbd96-c1ff-456d-9f60-72ca417b1d0d", "control-id": "cis_fedora_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7689,7 +7725,7 @@ ] }, { - "uuid": "36bbf221-13d8-45fd-98ca-5a13d3fa94aa", + "uuid": "fe3a2508-7e0d-4bfc-9bce-4d408407541f", "control-id": "cis_fedora_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7706,7 +7742,7 @@ ] }, { - "uuid": "c5a6ffc9-9f41-4d19-8d76-4dc6bd3e391f", + "uuid": "120bb162-3ae1-4a51-969a-dba2da7f09a8", "control-id": "cis_fedora_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7723,7 +7759,7 @@ ] }, { - "uuid": "f640d677-c68b-4d8b-b29b-4c1df89e0d95", + "uuid": "b25ef06c-a375-4556-9fd2-169b4c1f90ae", "control-id": "cis_fedora_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7745,7 +7781,7 @@ ] }, { - "uuid": "c997f193-ca9d-4482-a2f8-cfbb63dc592b", + "uuid": "f387d097-f662-4878-9ef1-5c36ea1cb603", "control-id": "cis_fedora_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7827,7 +7863,7 @@ ] }, { - "uuid": "5606c397-a65e-489c-ae5d-b5fba4712d67", + "uuid": "f3d43be5-a299-4fe5-8e40-650a97c3f638", "control-id": "cis_fedora_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7844,7 +7880,7 @@ ] }, { - "uuid": "37f1fa77-0737-4e6a-8eae-a27d209c6de6", + "uuid": "df9a5e5b-d647-47d4-a687-89da37a186d4", "control-id": "cis_fedora_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7871,7 +7907,7 @@ ] }, { - "uuid": "65ec0db8-b266-46e6-a87e-87628520c78d", + "uuid": "94eb8214-19be-4327-acd3-4f66308a809c", "control-id": "cis_fedora_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7893,7 +7929,7 @@ ] }, { - "uuid": "2363ceb5-b280-4808-8f95-80428d95c7f9", + "uuid": "4ed516d1-3414-4ef9-8f5e-5dc785cef684", "control-id": "cis_fedora_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7930,7 +7966,7 @@ ] }, { - "uuid": "8e7e880f-8cfc-432f-aff1-90d350345890", + "uuid": "4df5d1ed-00a3-4bc4-99a9-72ca76c57dac", "control-id": "cis_fedora_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7957,7 +7993,7 @@ ] }, { - "uuid": "7050d1e6-9c28-4ef3-a44d-e34c4af1599d", + "uuid": "87b20b05-6644-440e-8791-d4d2dcfc9c8a", "control-id": "cis_fedora_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7974,7 +8010,7 @@ ] }, { - "uuid": "0ef8f374-b916-4510-808b-9e102b83fe2e", + "uuid": "4c5762c8-8aab-4bd4-83b1-91a67841868e", "control-id": "cis_fedora_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -7991,7 +8027,7 @@ ] }, { - "uuid": "1402bfe4-5399-4b60-9ceb-c93da26364f2", + "uuid": "ef21819c-50ff-4f62-b19e-c7f8b1d3ef75", "control-id": "cis_fedora_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8008,7 +8044,7 @@ ] }, { - "uuid": "6279e029-1bbd-4f9a-b785-409620c8ea8a", + "uuid": "4ce4b974-ba42-45fa-8c6c-2d75517ca2a5", "control-id": "cis_fedora_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8025,7 +8061,7 @@ ] }, { - "uuid": "18f46fbd-718e-47e3-a012-ee509d8800d0", + "uuid": "4dc0099f-dce0-4f42-a568-94cf06ddf7c2", "control-id": "cis_fedora_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8042,7 +8078,7 @@ ] }, { - "uuid": "cbf7a6cf-ac8b-4a61-bd6a-32f94ccce74e", + "uuid": "15abed0a-a58e-4f86-87a6-8574ee8eed8b", "control-id": "cis_fedora_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8064,7 +8100,7 @@ ] }, { - "uuid": "438b4f24-3edd-4011-a2da-6e9ce8532d48", + "uuid": "66c43063-a75e-4c84-a562-529e42dbda91", "control-id": "cis_fedora_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8081,7 +8117,7 @@ ] }, { - "uuid": "c1e6a3b0-4796-44e9-b7c1-436ad1dc1105", + "uuid": "98916fce-bce4-4fff-9c44-5131bd7f7180", "control-id": "cis_fedora_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8103,7 +8139,7 @@ ] }, { - "uuid": "ad7ad708-5f31-42c0-b9ea-8dafebf1f306", + "uuid": "fdf9d002-d7ec-4ddd-bc05-b875de199558", "control-id": "cis_fedora_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8120,7 +8156,7 @@ ] }, { - "uuid": "281ae0c6-34e1-4bba-bb67-1ef9e70e5655", + "uuid": "47974b0e-e49e-41dd-8c4c-1bb8215942ee", "control-id": "cis_fedora_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8137,7 +8173,7 @@ ] }, { - "uuid": "9262e2cf-940c-4252-8474-70a98192fd1e", + "uuid": "7bf33412-add1-4dbd-a6b9-1ac486bcc87d", "control-id": "cis_fedora_6-3.3.34", "description": "The description for control-id cis_fedora_6-3.3.34.", "props": [ @@ -8150,7 +8186,7 @@ ] }, { - "uuid": "34c1ff84-8700-4d14-8940-eb79c1de3aa9", + "uuid": "e204d9b7-30e6-42ee-a333-970124954596", "control-id": "cis_fedora_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8167,7 +8203,7 @@ ] }, { - "uuid": "ee535142-eba4-46bf-9981-0630bdca37d9", + "uuid": "ea068cac-5999-4db9-abc2-eee173b66298", "control-id": "cis_fedora_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8184,7 +8220,7 @@ ] }, { - "uuid": "98d6c59d-2ca9-4f61-b74b-5fbec4f11250", + "uuid": "dca0966d-1ee1-43f2-8191-6146539b30c9", "control-id": "cis_fedora_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8201,7 +8237,7 @@ ] }, { - "uuid": "2289068a-1836-4165-b057-30cca9c845f7", + "uuid": "49bb0df1-f339-4e55-a3cc-5bedf71c71ae", "control-id": "cis_fedora_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8218,7 +8254,7 @@ ] }, { - "uuid": "8bb44f4a-c356-491d-9685-aed39eddfab5", + "uuid": "556a729e-f9fb-4f82-b5b2-8b9d122208f5", "control-id": "cis_fedora_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8235,7 +8271,7 @@ ] }, { - "uuid": "fd0cdcaa-2918-476f-bdf3-aa61da66b9f6", + "uuid": "5b9d20c9-7c61-4f91-813a-359698296407", "control-id": "cis_fedora_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8252,7 +8288,7 @@ ] }, { - "uuid": "20d0ba80-fda0-4248-8337-e722504ee878", + "uuid": "93fd7c79-0653-4410-9757-e36033b2e469", "control-id": "cis_fedora_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8269,7 +8305,7 @@ ] }, { - "uuid": "e2b1a6b6-4dc5-48c7-911a-bf1f980fb72e", + "uuid": "975016bd-e436-41ee-b1e9-70c9ac550378", "control-id": "cis_fedora_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8286,7 +8322,7 @@ ] }, { - "uuid": "43885918-08b8-49de-a4e0-38afc2a4ad06", + "uuid": "9c1bd18d-2d0e-4469-8b87-05091d67df4b", "control-id": "cis_fedora_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8303,7 +8339,7 @@ ] }, { - "uuid": "497ab001-262e-43a4-b632-e768cf53c694", + "uuid": "f6dda451-63f9-4ad0-acdf-38463ac1f0a3", "control-id": "cis_fedora_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8320,7 +8356,7 @@ ] }, { - "uuid": "6a150734-dad5-4cdb-b41a-94b75a5cfd9b", + "uuid": "963753a3-a69e-4f3b-b023-217574ae4fc3", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8337,7 +8373,7 @@ ] }, { - "uuid": "9f69ded1-183e-4e68-874a-f393c946b7eb", + "uuid": "77c206f2-427c-449b-9c1a-be63c33b1e82", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8354,7 +8390,7 @@ ] }, { - "uuid": "29a5d27d-ba26-4fdc-9967-ae7d5115e28c", + "uuid": "6516de92-9f95-4b79-bc98-5d9f63ae7f47", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8371,7 +8407,7 @@ ] }, { - "uuid": "f9a3b238-9c4a-45de-b2fc-75373f513de2", + "uuid": "55f38d7e-c83f-4f52-89ef-219d7e67df2e", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8388,7 +8424,7 @@ ] }, { - "uuid": "d5610204-7e23-49d8-8b94-f95f93c4c0a6", + "uuid": "c5a4c3f9-18b7-4173-aaa4-0f715075ac4d", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8405,7 +8441,7 @@ ] }, { - "uuid": "cb84a670-5626-4d5e-b260-98688d2293ce", + "uuid": "f0a74e47-2325-4df4-86fb-7f697da276ef", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8422,7 +8458,7 @@ ] }, { - "uuid": "a7e50dcb-fee2-4e6a-a4f1-e32fae132f79", + "uuid": "9da53cb4-4c4d-463a-90a9-ebcc0e7696c3", "control-id": "cis_fedora_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -8439,7 +8475,7 @@ ] }, { - "uuid": "f7164472-8d83-485b-82d0-cc519ad93ec7", + "uuid": "6f3be6ae-83aa-4f88-8ce1-357c8365071e", "control-id": "cis_fedora_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -8456,7 +8492,7 @@ ] }, { - "uuid": "6fbb0728-0734-4f20-af6d-14926759895b", + "uuid": "c3480017-14af-4906-abb6-0686a2ced253", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -8469,7 +8505,7 @@ ] }, { - "uuid": "911e4f57-e8d2-49e1-92f0-98a6d92fde5f", + "uuid": "6c5fea85-fb3f-45ff-b8f8-7a919fdf6cba", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8486,7 +8522,7 @@ ] }, { - "uuid": "c0f1f992-7ec4-4dfc-a638-ab4cf4acc3d5", + "uuid": "7b6d6561-5e96-4f7d-a282-dc1ec1a42830", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8503,7 +8539,7 @@ ] }, { - "uuid": "23a96c50-fefb-46ab-9dad-b99adaa67249", + "uuid": "fa2c7f72-51aa-464b-ab9a-e5ba562a4912", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8520,7 +8556,7 @@ ] }, { - "uuid": "ed3240d6-b23b-4967-96d0-382f94f3a02b", + "uuid": "86c2c569-6a2a-4a9c-bf25-f40ef0c22c62", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8537,7 +8573,7 @@ ] }, { - "uuid": "85652b48-a4e1-4afe-b675-c678f5d9182c", + "uuid": "55728261-0617-4b8f-8f0d-ea2af533a36b", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8554,7 +8590,7 @@ ] }, { - "uuid": "9186a0de-6c66-4c08-a97d-e7e818935666", + "uuid": "eff8a564-364d-4918-b4af-255a536d52f7", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8571,7 +8607,7 @@ ] }, { - "uuid": "1b81b4cc-ff2d-4ff6-8b2f-3fa4edc8f90e", + "uuid": "161fc17f-5bb9-47e9-97c7-44036d347070", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8588,7 +8624,7 @@ ] }, { - "uuid": "d2f4a1d2-af1e-4713-ab4f-9e0a2cf745e4", + "uuid": "23b65749-ab5d-404e-b7b4-c10cc5999ba2", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8605,7 +8641,7 @@ ] }, { - "uuid": "351db277-255b-493e-bfac-f1eaabeefb9c", + "uuid": "6cf8ada8-8ff0-49c2-a472-abc50aa47051", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8622,7 +8658,7 @@ ] }, { - "uuid": "3337c8a6-3198-43de-af19-d21ba869243d", + "uuid": "71adfffb-52a3-4d5d-af6b-8ea9dc752f58", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8639,7 +8675,7 @@ ] }, { - "uuid": "1e2f464e-624d-454d-9d78-6e255cd50080", + "uuid": "120c8939-214f-4fd9-913e-a82688fbdb9d", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8656,7 +8692,7 @@ ] }, { - "uuid": "8ba46570-37bf-4288-abe6-dd7c828d5087", + "uuid": "46f420a0-268c-44e8-8495-cb5628d3bd06", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8673,7 +8709,7 @@ ] }, { - "uuid": "42df8659-8f1b-475b-bf82-fcddce905d80", + "uuid": "6c01056c-579f-4c5a-bef3-948c424a1a7a", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8690,7 +8726,7 @@ ] }, { - "uuid": "2544adb4-c0d1-44df-bf16-ef799cd48ba0", + "uuid": "ce4728f2-036a-4527-9a11-6847992efb24", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8707,7 +8743,7 @@ ] }, { - "uuid": "7f7401ca-5076-4880-8723-4a62ce3a24f4", + "uuid": "57547ae2-d736-4bc0-9f2d-1c070ab077d2", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8724,7 +8760,7 @@ ] }, { - "uuid": "fed5835d-2b3b-43f0-bf01-b711a28266d9", + "uuid": "dea2f336-6187-4996-ba08-a0cc40c7975b", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8741,7 +8777,7 @@ ] }, { - "uuid": "e4971e83-276b-48d3-ae7c-8d5b3cbf1c1e", + "uuid": "a1813104-1e88-422b-8866-e35c15d53e9b", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8758,7 +8794,7 @@ ] }, { - "uuid": "b9e095d0-581a-484f-90d7-c3bb7b82b70f", + "uuid": "6d69f2cd-8bcf-4dd3-a2cc-0977c164caa3", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8775,7 +8811,7 @@ ] }, { - "uuid": "cafb54ee-e291-49f1-acc4-3f4b66e53f89", + "uuid": "81111054-f5b6-43ad-b0b1-15743f0175ed", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8792,7 +8828,7 @@ ] }, { - "uuid": "adf1c0ef-b106-4802-84b1-1c156ac6f9be", + "uuid": "33a0b5bc-c472-4fb7-bf7a-d4abd1bb464c", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8809,7 +8845,7 @@ ] }, { - "uuid": "1bdc4b4d-6995-4ba0-bf3d-eeee4adfce80", + "uuid": "0d24fd82-e06e-47d5-835c-7a580dd7ee1e", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8826,20 +8862,24 @@ ] }, { - "uuid": "c338867e-aa54-4845-9044-5ddf22c4698c", + "uuid": "1d067e38-9298-4165-b251-e5481db4534a", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "6205608a-994e-4498-8513-b285ce8f0afe", + "uuid": "42c485bf-90ba-48b7-bfd8-560ab9e0250c", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8856,7 +8896,7 @@ ] }, { - "uuid": "35e230c1-a99d-4128-8e30-f0c63f916edb", + "uuid": "5388e8a0-2bd5-451f-aa7a-5ff4674857d2", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -8869,7 +8909,7 @@ ] }, { - "uuid": "cb6d0527-aed2-4a7b-84ca-a1a00c715627", + "uuid": "c4274035-1e12-47fd-bcdc-3bc2b7fbab63", "control-id": "cis_fedora_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -8886,7 +8926,7 @@ ] }, { - "uuid": "7057f4d2-b957-40ca-aef5-53f49d77ecd8", + "uuid": "20528981-5a4b-42ca-88b5-2d7e9e7d2762", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -8899,7 +8939,7 @@ ] }, { - "uuid": "0717421b-ac23-4909-8272-13a02639bcd1", + "uuid": "2dddae43-7bc3-4f4f-a2c2-293407d81568", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8916,7 +8956,7 @@ ] }, { - "uuid": "eed1f015-1c5d-4e7e-80db-5c87519cf985", + "uuid": "b009ef2c-db78-46ce-8ad0-eadcb7718cfa", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8933,7 +8973,7 @@ ] }, { - "uuid": "dd14ee4c-25a8-49bd-826f-e6251e61322b", + "uuid": "7baf6603-cd6b-4bb8-bee0-49a036480f76", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -8950,7 +8990,7 @@ ] }, { - "uuid": "ca668b88-d6fb-4d95-a2aa-e046562c7fe8", + "uuid": "6ca6e468-0c09-4f81-b572-b84c2e95a106", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -8967,7 +9007,7 @@ ] }, { - "uuid": "af5d26c0-d38e-4181-8261-c44b2e885db4", + "uuid": "44c562ec-d238-45bd-b5f5-513b95d03171", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -8984,7 +9024,7 @@ ] }, { - "uuid": "99c2efcd-5a02-4e87-a01c-2f0a2ea3ba36", + "uuid": "a3ca80a7-db21-4440-a925-f8b963252830", "control-id": "cis_fedora_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -9001,7 +9041,7 @@ ] }, { - "uuid": "c95d47ad-5e1d-400b-9464-625bf0e01c44", + "uuid": "01aa4942-a30a-4b4f-9784-523b859635e8", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9018,7 +9058,7 @@ ] }, { - "uuid": "0aa5b657-b0cc-4bd3-8892-e0588c16bfc6", + "uuid": "08802d88-97c4-488c-936c-878fdec00bd6", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -9045,7 +9085,7 @@ ] }, { - "uuid": "dee17a9e-8367-4d77-8ea2-bd9074d63a00", + "uuid": "1b378c29-9ea6-4801-8cbf-8f0400bbf1e7", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9062,7 +9102,7 @@ ] }, { - "uuid": "ed3fec90-fefd-4919-bdb8-03b138592771", + "uuid": "a1002f48-bdaa-494f-a5b7-c679a258699e", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9079,7 +9119,7 @@ ] }, { - "uuid": "6c241578-3310-4ddc-a28f-eb9b126bdcb2", + "uuid": "0f5edecc-b9ca-4025-bc55-ec29cee29b02", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -9096,7 +9136,7 @@ ] }, { - "uuid": "6562ee5f-0fd0-459f-8020-82a1678ff6cf", + "uuid": "2ad6865c-ff37-4dc4-91d6-bf7279185e51", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9113,7 +9153,7 @@ ] }, { - "uuid": "d4748378-c8b7-4186-9b43-c9d57c768b37", + "uuid": "3c31534d-7e40-4239-867c-0b1b2b0976be", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9130,7 +9170,7 @@ ] }, { - "uuid": "d8139bc4-98d3-4dd0-88a9-5ba0048e58aa", + "uuid": "1790a1a2-f4e6-4908-b755-b1004aa9639f", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9147,7 +9187,7 @@ ] }, { - "uuid": "602bdab3-1207-446b-8fee-9c24bd2777fc", + "uuid": "620d2556-fbab-4ea4-83d4-bcc4adac7b08", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9164,7 +9204,7 @@ ] }, { - "uuid": "25ec9a8d-94f5-4243-b44a-76c93f88a6cc", + "uuid": "16d4ff91-4de1-4958-9f23-64acc9b3d09c", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9181,7 +9221,7 @@ ] }, { - "uuid": "dc2325d1-726b-427e-ace7-516a5673d8f1", + "uuid": "dc713304-29a8-4f3e-8dc5-85a4fe5368af", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9198,7 +9238,7 @@ ] }, { - "uuid": "0e3396b1-0246-42b7-8f9a-37186a0958d5", + "uuid": "97de2ed5-385e-48a0-bc2e-dbc69f51ec18", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9215,7 +9255,7 @@ ] }, { - "uuid": "8f13c8bb-feae-4aa9-a66d-948c658e90b1", + "uuid": "b9ebe098-3fe3-4648-99cd-c045642d4bdd", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9232,7 +9272,7 @@ ] }, { - "uuid": "39fc86b0-a7a2-4d36-87af-7dcc602e0bac", + "uuid": "b59cc624-c170-4ebd-a2d2-ded471d79c68", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9249,7 +9289,7 @@ ] }, { - "uuid": "1cd28e37-993a-4fd9-b32c-f2e17a348bdf", + "uuid": "77fe2010-beb2-4260-85d9-7a1e5f4b1e94", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9266,7 +9306,7 @@ ] }, { - "uuid": "ed9b6cfd-30b9-4d84-9420-fc49e72e50e9", + "uuid": "fc3f22d6-10aa-4d64-89f7-426470dadf1c", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9283,7 +9323,7 @@ ] }, { - "uuid": "15336ecf-22da-4071-bdd2-4a9fa7302cd0", + "uuid": "462df242-9eff-4aa9-a9a1-88feaf26414c", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9300,7 +9340,7 @@ ] }, { - "uuid": "3248d4be-fbd7-4fd8-8721-3693b8a1e77c", + "uuid": "56f1ea1e-fb08-462f-8ff2-f71c470f1e72", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9317,7 +9357,7 @@ ] }, { - "uuid": "084c876b-8c73-4170-8b3b-dd97b5e7a1dc", + "uuid": "1530c891-9d7b-4f35-a801-83f19db9ebcd", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9334,7 +9374,7 @@ ] }, { - "uuid": "c767d8ae-2625-4c1a-9e50-25cbae1930f7", + "uuid": "3f47a6b3-f2e4-496d-a04c-94fbcfc72387", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9361,7 +9401,7 @@ ] }, { - "uuid": "d41ace38-3b97-40d5-9e48-af4dbe0dc848", + "uuid": "f136a807-8e7c-4bb2-9c64-85a3aa486f56", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9388,7 +9428,7 @@ ] }, { - "uuid": "bacea3c6-98c9-4042-908d-43a660952739", + "uuid": "1fe1fe75-c9dd-417c-ad8a-11c4e8e22fef", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9415,7 +9455,7 @@ ] }, { - "uuid": "7505927d-1fe2-477f-a666-d7648923f1c0", + "uuid": "bd694750-0f49-424e-be4c-9c9e895e73ca", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9437,7 +9477,7 @@ ] }, { - "uuid": "e5a5c79f-e0ec-497f-9b61-c36a72904eee", + "uuid": "b734db1b-e2f3-404d-997f-9c7d6909f03d", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -9454,7 +9494,7 @@ ] }, { - "uuid": "1086835f-4fe6-460d-a126-79c3add1ebdf", + "uuid": "c38c72fc-317e-49e3-99c7-f7c44d928756", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9486,7 +9526,7 @@ ] }, { - "uuid": "974f891b-855a-4d8e-b652-dab5e593c5ee", + "uuid": "c4cdfdb1-3686-4c9d-89cc-889e6bccdd42", "control-id": "cis_fedora_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -9508,7 +9548,7 @@ ] }, { - "uuid": "b090e89e-928a-46e3-b788-b826ff6a1156", + "uuid": "9ec2c5bc-966b-4638-be0c-ce3def652802", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9525,7 +9565,7 @@ ] }, { - "uuid": "8a62c3f7-daea-461f-b040-23c1529dbc3a", + "uuid": "c884b1aa-6082-4672-a831-16acfca56ebe", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -9538,7 +9578,7 @@ ] }, { - "uuid": "d0b35bd1-8f40-46e4-8875-d4332952c81e", + "uuid": "558fcea9-64ae-4065-b031-6dd55e34a9e4", "control-id": "cis_fedora_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -9555,7 +9595,7 @@ ] }, { - "uuid": "f325580c-a799-4e6a-ae87-6cf30db3d110", + "uuid": "c7778493-b15e-45ca-a3c4-4693b900cbc8", "control-id": "cis_fedora_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -9572,7 +9612,7 @@ ] }, { - "uuid": "75832b16-52e0-4846-9f11-df676d5f5e98", + "uuid": "1d453795-7fed-4bf7-956b-4200949dcfae", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9589,7 +9629,7 @@ ] }, { - "uuid": "ff130720-d5c4-41dd-b946-4d344e89ce5a", + "uuid": "d8bb7959-99c7-4c28-9ef2-d44a81fa2a91", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9606,7 +9646,7 @@ ] }, { - "uuid": "02b56887-bf06-4a51-9229-5d0108691b2a", + "uuid": "d73538ca-5130-4040-ab86-2ad16ddcba1c", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9623,7 +9663,7 @@ ] }, { - "uuid": "daedfa98-c836-44f9-9bbf-6ab93915ad70", + "uuid": "18825a12-7343-4146-9f6f-de9059425bc6", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9640,7 +9680,7 @@ ] }, { - "uuid": "eaeb3eda-2d6c-42d0-b986-e83556964f14", + "uuid": "88182173-ed11-4296-8a77-0fde7f4c3608", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9662,7 +9702,7 @@ ] }, { - "uuid": "757ba5d5-fb92-4d7c-8e29-50be0f03fd7a", + "uuid": "616456fe-a989-41cc-9c8c-10203c10fbb1", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9679,7 +9719,7 @@ ] }, { - "uuid": "32dc61de-a721-4e1e-807d-aefdeb764386", + "uuid": "f55a8dd6-d0dc-4158-bc39-4251beb0816c", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -9691,7 +9731,7 @@ ] }, { - "uuid": "2a1e0af4-448d-4c51-8e5b-57ddac3bbdd3", + "uuid": "52e8d8a1-5c3b-45bc-aa76-af132a0018e6", "control-id": "cis_fedora_2-1.11", "description": "No notes for control-id 2.1.11.", "props": [ @@ -9708,7 +9748,7 @@ ] }, { - "uuid": "c1de8529-baca-4fe0-83c3-bd423b04eb8a", + "uuid": "8dd95d04-4321-427e-b3bc-d1b76ec74a31", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9725,7 +9765,7 @@ ] }, { - "uuid": "259fb61a-c5ca-483d-803f-f5b57d4942bf", + "uuid": "ddee30c1-5f82-45ad-acbb-24375cd219f3", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9742,7 +9782,7 @@ ] }, { - "uuid": "c1633d72-a8eb-42df-840a-82d594e5b925", + "uuid": "b32a0e41-5447-438f-be92-b956d0ac93b2", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9759,7 +9799,7 @@ ] }, { - "uuid": "46ad36ba-1556-41e0-8990-643ab8c70f94", + "uuid": "b8046ed1-bf23-4941-b898-79211302baac", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9776,7 +9816,7 @@ ] }, { - "uuid": "2bd297bb-39df-4c56-91a4-e62012674ccc", + "uuid": "18594503-0d98-4866-994a-5d31c7d4d988", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9793,7 +9833,7 @@ ] }, { - "uuid": "a1099ace-2439-462a-9d43-5e2dff33125f", + "uuid": "1916895e-1a8c-4205-b393-0c5ecf17e850", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9810,7 +9850,7 @@ ] }, { - "uuid": "4df13e43-7fff-4fb4-9b20-ae690319ec8a", + "uuid": "975a8d84-9b39-4981-858f-6a4574c45ad6", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9827,7 +9867,7 @@ ] }, { - "uuid": "23b12d9b-db84-4a89-b050-c59c93f01d83", + "uuid": "c6a72bb9-fdc2-4cf0-a657-cc82f74df11c", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -9849,7 +9889,7 @@ ] }, { - "uuid": "b99f9fac-ebe7-4ba4-a232-b359df17202c", + "uuid": "9b4204d5-ca3e-49eb-ba94-190a855750ed", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -9862,7 +9902,7 @@ ] }, { - "uuid": "3792dcef-042b-40fa-b8f1-5d045635b780", + "uuid": "6bd3d70f-ad55-4187-8e47-47efa1d41d50", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -9884,7 +9924,7 @@ ] }, { - "uuid": "d137190b-3252-4b2c-9205-c3ff79e25779", + "uuid": "2d5a07a6-0227-4fb7-9911-c315fb400c14", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -9897,7 +9937,7 @@ ] }, { - "uuid": "2338487c-74d0-433f-9380-bcc316c2d8bd", + "uuid": "aeda78cc-7c0e-4126-bf50-580315a668ff", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9914,7 +9954,7 @@ ] }, { - "uuid": "e97967bf-5272-46f5-8728-098295c6fa55", + "uuid": "01bcc3f1-fadd-415d-a0c3-1740d6809506", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9926,7 +9966,7 @@ ] }, { - "uuid": "10b2ed97-208e-4d89-90f4-9b5a3a41cc89", + "uuid": "6b15b5f6-83fb-45a2-ae93-91f2b9b4f644", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9943,7 +9983,7 @@ ] }, { - "uuid": "18bad191-9919-4bfc-a574-893d6f2ab446", + "uuid": "aef4c9bb-6f78-4fae-b4e1-273a50771101", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -9960,7 +10000,7 @@ ] }, { - "uuid": "18bd9f2d-bc3d-4f8d-b459-9518665f563f", + "uuid": "c0b9fb8f-bff2-4291-ab3a-fa1d968c73ea", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9972,7 +10012,7 @@ ] }, { - "uuid": "c5fbffd6-4ac5-44c1-82d1-95011d8d869e", + "uuid": "783b3dce-3337-41d8-8e80-952b444844d1", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9989,7 +10029,7 @@ ] }, { - "uuid": "4d68038b-486c-4ccb-a898-f045e0a63f77", + "uuid": "2e9de6d1-b176-4608-ada8-dd50105c81b8", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -10006,7 +10046,7 @@ ] }, { - "uuid": "2beae69d-7704-49c0-b11f-655f6910e563", + "uuid": "521eb041-973b-4fe4-86a7-f6b0477c54eb", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -10028,7 +10068,7 @@ ] }, { - "uuid": "11db6402-f378-4934-8c55-5f9326af30ea", + "uuid": "1a697de8-28da-4389-a20c-9e186a9504d6", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -10055,7 +10095,7 @@ ] }, { - "uuid": "64e8869b-e4cf-4b21-ad9f-f1f6cecbaa8f", + "uuid": "d95ad342-be4a-4ea2-82f8-c719f1c39df8", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -10082,7 +10122,7 @@ ] }, { - "uuid": "7e0366b6-591b-4387-9166-35fe45a25bf4", + "uuid": "f2d47fea-5cc1-48ec-8dea-715f06c146f6", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -10109,7 +10149,7 @@ ] }, { - "uuid": "10f625cb-c79e-4196-b784-c05e92f858d2", + "uuid": "0cc8fd20-7cd0-4542-a6e4-a4ef730586fb", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -10136,7 +10176,7 @@ ] }, { - "uuid": "646ef74a-46a8-4ad1-941d-70cfff178e28", + "uuid": "9402ecb8-ad5d-49d1-a310-4cbc59bdc4f7", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10163,7 +10203,7 @@ ] }, { - "uuid": "889cfc79-00d3-4845-a3ee-e7f4495c3475", + "uuid": "3ae61b1c-79f0-47ea-9a9a-7fac9eac3370", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10190,7 +10230,7 @@ ] }, { - "uuid": "3dd667fe-a1b4-49bd-969d-ffc61e343545", + "uuid": "a6115e8a-96fe-49d8-adbf-97ffd0e7aec2", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10217,7 +10257,7 @@ ] }, { - "uuid": "677b2894-0687-47b0-a45c-1ff6dd4b74b6", + "uuid": "70fb4090-94c8-4f7b-ac4d-456454b63bca", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10254,7 +10294,7 @@ ] }, { - "uuid": "cb9c1074-ff98-4592-b0c7-77d8288daefd", + "uuid": "eeeafbb5-fafd-4d35-9d6f-19fac9ca29c5", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10291,7 +10331,7 @@ ] }, { - "uuid": "65980429-9483-4834-b609-7a88241a71ef", + "uuid": "82691d7c-ef9d-4a4e-84b1-207c93e8d11d", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -10304,7 +10344,7 @@ ] }, { - "uuid": "80c2b3d3-930b-46bf-a494-6b69b16cbd68", + "uuid": "40e6fdb2-c212-4537-8346-f42df3feb7da", "control-id": "cis_fedora_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -10321,7 +10361,7 @@ ] }, { - "uuid": "dd192fa6-2205-4578-95e3-94cea5790714", + "uuid": "8fa2c596-46bc-436e-9a9b-6dcdf14deca8", "control-id": "cis_fedora_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -10338,7 +10378,7 @@ ] }, { - "uuid": "0d237ad1-b221-4875-8f7c-d08004673bae", + "uuid": "926b63c1-4df0-4e84-9ed8-b6682b9d22a4", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10355,7 +10395,7 @@ ] }, { - "uuid": "38e52dd1-a408-4abe-8b93-018d1cb0dd47", + "uuid": "aa9bb00b-de52-400b-ba71-e197618aaa49", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10372,7 +10412,7 @@ ] }, { - "uuid": "5cef8a48-7726-4839-a37e-129695456edb", + "uuid": "c4d0b384-1435-4760-b627-fd78bf9af0dd", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10389,7 +10429,7 @@ ] }, { - "uuid": "8e98d258-9258-4479-9f39-b91b17c6c6e6", + "uuid": "0646c865-ca90-4519-8d14-a56f6c11f31d", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10406,7 +10446,7 @@ ] }, { - "uuid": "ccbbbd2c-c7e6-407d-a3ed-75b9a8e96f79", + "uuid": "4a385b1c-2219-42f8-a7fb-cec9e8bb3178", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10423,7 +10463,7 @@ ] }, { - "uuid": "97b2ef8c-90ff-4b1c-b68d-c5720ae0c861", + "uuid": "6b211d51-5dc1-4da8-809b-490258c09de1", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10440,7 +10480,7 @@ ] }, { - "uuid": "b36e75d8-74fc-4018-982a-e7634715b110", + "uuid": "5ad1cb46-e353-435f-ba3e-d9a618b60f8f", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10457,7 +10497,7 @@ ] }, { - "uuid": "93002fba-533d-49cd-94e0-d02bdcf573e1", + "uuid": "4401eb09-6c55-4525-89c9-38e7e4867b0b", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10474,7 +10514,7 @@ ] }, { - "uuid": "284e99fe-0355-40d3-b411-7e0f58eed382", + "uuid": "3021743c-ef2a-4e80-85e2-de185c831ba7", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10491,7 +10531,7 @@ ] }, { - "uuid": "d9f7f5b0-dd84-4434-afc4-e9ddfda7889c", + "uuid": "01c467d7-bb3f-4380-8bf1-0746894df906", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10508,7 +10548,7 @@ ] }, { - "uuid": "88242cd9-bc4c-448e-a6d5-4042e3762e46", + "uuid": "c3b51d0f-749f-49a5-b194-c688ef515af9", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10525,7 +10565,7 @@ ] }, { - "uuid": "961108be-77a9-42aa-b32d-8c5682b16f1c", + "uuid": "85d330c1-372a-4c66-bad7-5d143ca02931", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10542,7 +10582,7 @@ ] }, { - "uuid": "6099bb04-fdb8-4e57-a742-30f2e6ef6685", + "uuid": "213e84de-a4e4-45c2-8da0-84053354039a", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10559,7 +10599,7 @@ ] }, { - "uuid": "57c9730b-0739-4045-932a-aca90d92374a", + "uuid": "b7c2db24-f46d-4001-b77d-b94176b495af", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10576,7 +10616,7 @@ ] }, { - "uuid": "bca663cf-e28c-4e2e-a2d1-8d7c5cc2e21c", + "uuid": "4f51f5fe-8159-4dfe-92b7-92f5f0d987f8", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10593,7 +10633,7 @@ ] }, { - "uuid": "44949886-9130-4478-af01-02af5b6604b1", + "uuid": "7116986d-2709-477a-aae6-8c6961f3ce74", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10610,7 +10650,7 @@ ] }, { - "uuid": "90640a73-9b94-4a0f-a626-f6211aa0a94a", + "uuid": "3d5cb6d4-ef57-4a2d-9726-3aed3f14e078", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10627,7 +10667,7 @@ ] }, { - "uuid": "dc27df08-5ffa-47c5-94eb-02d1ae48d8b9", + "uuid": "94a224e5-e19a-411e-8863-4827aadf2ffc", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10644,7 +10684,7 @@ ] }, { - "uuid": "6a7365eb-435c-45e0-9e42-312a616d0546", + "uuid": "94c6be05-4357-4a74-892b-db6af48da8db", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10661,7 +10701,7 @@ ] }, { - "uuid": "9ae3afda-bcb5-46a4-8125-3a69937077ba", + "uuid": "cc4b89d2-24ff-428a-a6a1-2a4ab3c36c2a", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10678,7 +10718,7 @@ ] }, { - "uuid": "e5f76d6c-61c7-4c02-8ebc-d303e1435242", + "uuid": "e00d953f-3896-4078-a85b-b9e273bcd5fd", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10695,7 +10735,7 @@ ] }, { - "uuid": "f9c865d0-0667-44e4-8f60-b19ea915d0da", + "uuid": "cc699974-b2db-4466-a26c-c50473fc2547", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10712,7 +10752,7 @@ ] }, { - "uuid": "3aa8cf38-f3b0-49da-a4c7-5e0b25df553d", + "uuid": "0ec65424-9c15-447e-8aa0-f29eb8f6781f", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10729,7 +10769,7 @@ ] }, { - "uuid": "68752259-569a-4e07-b513-11afe934e76d", + "uuid": "49188a0b-b0b8-4836-9f01-e550b7aa737b", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10746,7 +10786,7 @@ ] }, { - "uuid": "b42ccd95-bede-443a-ac11-ea8791d5e30f", + "uuid": "c284712d-62d7-470d-872c-e060e67436a9", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10763,7 +10803,7 @@ ] }, { - "uuid": "a70eb93c-a9bc-44ed-be79-e3cdd5c63d7c", + "uuid": "1223d803-46bc-4c1a-a027-47214c35bd2a", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10780,7 +10820,7 @@ ] }, { - "uuid": "0a53d69c-b91d-4428-bd85-83d32dc24eb5", + "uuid": "ea8f9828-08f7-4000-a156-24d8522926a0", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10797,7 +10837,7 @@ ] }, { - "uuid": "cce39d31-9fa9-473d-84d4-594e5a55fa28", + "uuid": "40b301c6-b0b1-4afa-8a0c-6bf095ed72f4", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10814,7 +10854,7 @@ ] }, { - "uuid": "bc20160c-6e97-4973-b34f-ffb64024a1fb", + "uuid": "8a78ff3a-ee31-493b-97de-3572365a38fe", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10831,7 +10871,7 @@ ] }, { - "uuid": "6ca75ca4-8ab5-4a6c-855d-128d647d7728", + "uuid": "6c8fcd49-7aa5-4a7a-b27f-38ad5880e958", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10848,7 +10888,7 @@ ] }, { - "uuid": "0b3a69ee-dd58-4e59-9f44-5c051663e039", + "uuid": "3b501cb1-ba59-47fc-b8b0-1aaaef3b1b70", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10865,7 +10905,7 @@ ] }, { - "uuid": "c2af1049-62bb-4dcc-93c3-16c6c69eb61b", + "uuid": "b339399e-dd07-41b7-b4d9-c1aafdf6069c", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10892,7 +10932,7 @@ ] }, { - "uuid": "04f14109-7083-43e5-9663-0f3e370bcef3", + "uuid": "17d091d3-b071-4f23-885d-57cbbb2bed5d", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -10905,7 +10945,7 @@ ] }, { - "uuid": "a7d5f306-dae1-4b9d-9d2a-84b5113f6c83", + "uuid": "53707530-65a2-463c-a719-00524b227d06", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -10927,7 +10967,7 @@ ] }, { - "uuid": "ea1352d5-e24d-437a-a2ed-df439a97e2a7", + "uuid": "3f75be37-2098-4e55-aa3e-70ea57f89f53", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -10939,7 +10979,7 @@ ] }, { - "uuid": "858f6136-eb40-4333-a635-4fdc81bafaa2", + "uuid": "d692abd1-8a15-4bb0-8a3f-2f70652ce605", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -10952,7 +10992,7 @@ ] }, { - "uuid": "556ebdbf-9302-4755-b21d-ce409f6faa07", + "uuid": "08c47d39-36b2-49d9-8d78-4f587444748e", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -10964,7 +11004,7 @@ ] }, { - "uuid": "29374e89-3e02-4eb1-b893-8b6452a3e1c4", + "uuid": "bc0457a7-578c-47bb-9f46-b565f093b8cb", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -10976,7 +11016,7 @@ ] }, { - "uuid": "69a6c300-6ada-497d-8328-629e45b2d3fa", + "uuid": "6496da6c-375d-4cea-b597-4301b8f28ac8", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -11033,7 +11073,7 @@ ] }, { - "uuid": "7ee0b57b-69b0-4499-95f9-c53ad4f681fb", + "uuid": "df7ef5b3-d9fa-4aac-a9b6-e5cfdb204b4d", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -11060,7 +11100,7 @@ ] }, { - "uuid": "5b81f9fd-824b-4437-a8a1-5a2b4a28569b", + "uuid": "ab8dc0b2-cde1-4277-979e-25aae278dcc8", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -11087,7 +11127,7 @@ ] }, { - "uuid": "8d4e010b-b992-41e9-8553-77ba96e83fa2", + "uuid": "4d109920-b8d0-4e5a-8f38-c9a105790e27", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -11104,7 +11144,7 @@ ] }, { - "uuid": "9604c238-aff1-483b-bfad-c1ef1e23fec3", + "uuid": "e7087e99-ab89-4537-bf03-02831ee09e7c", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -11121,7 +11161,7 @@ ] }, { - "uuid": "9645127f-ce6c-4ca1-8b3f-36e17e045306", + "uuid": "185bb0c5-c635-46b1-8ba5-eb3fa63a2587", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -11138,7 +11178,7 @@ ] }, { - "uuid": "8ae1dd57-9156-4bf0-84ae-d52a9ef7e9ce", + "uuid": "f49bd105-0a99-47af-a341-bea7dfaa6f28", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -11155,7 +11195,7 @@ ] }, { - "uuid": "bf07610a-7494-4b41-ad82-57ad816dae24", + "uuid": "5da52c2a-52ee-447b-b71b-2f963ea98979", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -11172,7 +11212,7 @@ ] }, { - "uuid": "f1a82b8f-c1ee-40cc-a7b5-cfcf8ae46b44", + "uuid": "57f3fdb8-b8f4-48af-8b05-305fedf71fa2", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11194,7 +11234,7 @@ ] }, { - "uuid": "0835c62f-0080-4d1a-8076-c65cc80471aa", + "uuid": "7442fc71-8d70-427a-aeac-dec7dd73d6d8", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -11211,7 +11251,7 @@ ] }, { - "uuid": "ae3babb1-fbc1-4777-a395-0613ec2676bc", + "uuid": "75ff5bf9-f354-479e-80c9-e239f0f24486", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11228,7 +11268,7 @@ ] }, { - "uuid": "67227436-2f8a-47b8-a398-38e4b932c974", + "uuid": "70de25fd-dac4-4e13-b119-13c4da7891ac", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -11245,7 +11285,7 @@ ] }, { - "uuid": "cb82eb25-2db9-4d61-a90a-a328811cad13", + "uuid": "92cdfc9f-2b11-48ff-800a-ae7061baec08", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11262,7 +11302,7 @@ ] }, { - "uuid": "3d340f74-1e17-4b58-9370-50fb2b94cb3d", + "uuid": "f5d2da04-6ff6-4087-97fb-1a9f3c6ad941", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11279,7 +11319,7 @@ ] }, { - "uuid": "05e76056-0d35-4eca-bf3c-43d5736a476e", + "uuid": "8d42d497-e879-4ebc-beb4-d73f5583eff0", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11296,7 +11336,7 @@ ] }, { - "uuid": "b149beb8-d0f2-45e6-b628-13599f23863d", + "uuid": "5eba5cc1-651f-4c5c-b031-3f7d8fe309af", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11313,7 +11353,7 @@ ] }, { - "uuid": "310a0302-d137-410f-9f32-c72765d36012", + "uuid": "2ce6115d-0f2e-4822-884d-6c17d3e049e9", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11330,7 +11370,7 @@ ] }, { - "uuid": "361f8062-d854-4e52-95b7-d2f969012414", + "uuid": "2b882ee2-bb22-4e7e-9c07-a873051303da", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11347,7 +11387,7 @@ ] }, { - "uuid": "fffecb1b-d532-4e90-8662-bc10134251c4", + "uuid": "e041582d-11df-4b9c-8872-01545962ef5c", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11364,7 +11404,7 @@ ] }, { - "uuid": "da32c082-518d-4d1f-bb89-5788e7b08694", + "uuid": "084351be-ef6b-40c5-808e-0b88e283a4a0", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11381,7 +11421,7 @@ ] }, { - "uuid": "aed7ea69-a433-4ac0-89c5-827d4faac2f8", + "uuid": "b81e2774-5116-4bc1-bb8f-cf2d17ac08f1", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11398,7 +11438,7 @@ ] }, { - "uuid": "ad9cd0de-d909-47d1-8b5d-b045449fbff8", + "uuid": "53de5f20-a4d4-42fd-b650-4d8a70686fae", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11415,7 +11455,7 @@ ] }, { - "uuid": "fb131fce-7b74-473f-a9a8-c47e4cce5ca1", + "uuid": "61d07de3-bd79-485a-994a-c771a983c90d", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11432,7 +11472,7 @@ ] }, { - "uuid": "24bc3434-6642-4196-89c3-250f6cfaf55b", + "uuid": "292bdb37-159f-4989-8183-f9f729bfa6dd", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11449,7 +11489,7 @@ ] }, { - "uuid": "25d46ccc-d7c3-4bf1-a69f-f264fd161777", + "uuid": "9b3e95fc-4884-4902-9904-dd9f7f4176ff", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11466,7 +11506,7 @@ ] }, { - "uuid": "11305988-e87e-406d-b44c-deae9ad6749d", + "uuid": "eee8137c-07d4-4a53-a9be-86cac2ae4fee", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11488,7 +11528,7 @@ ] }, { - "uuid": "823a70aa-9310-4f3a-bf97-6e4869e01d50", + "uuid": "b5ecd4f1-05c6-4fad-a3c4-13f2ba1c253b", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -11501,7 +11541,7 @@ ] }, { - "uuid": "731a587e-78cf-4af5-ac10-4e3b4c934498", + "uuid": "93e10a73-0030-4fa1-81b4-80037c513fa2", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -11514,7 +11554,7 @@ ] }, { - "uuid": "5b01203e-253d-4c5e-b8be-533354b19695", + "uuid": "f24a1ee5-2654-4998-bb66-05565f4788d1", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -11532,7 +11572,7 @@ ] }, { - "uuid": "7a55c455-5506-4972-a475-e4bb3427b961", + "uuid": "138a50b7-6f08-427f-b208-039fa3d6836f", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -11549,7 +11589,7 @@ ] }, { - "uuid": "37d8243d-734d-4e34-b2b8-4c5bd1c39738", + "uuid": "291b1ba4-4c3e-4325-a38b-4e5fc0245c64", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -11571,7 +11611,7 @@ ] }, { - "uuid": "2d3f99a6-bc0f-4916-935e-532f7d8b322f", + "uuid": "23bbe925-022f-454f-b625-53ec024b5423", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -11598,7 +11638,7 @@ ] }, { - "uuid": "78673166-8c56-4e66-936f-95a22f9194f9", + "uuid": "ea188817-27f8-4532-b25a-a84a830f3d55", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -11610,7 +11650,7 @@ ] }, { - "uuid": "07fe940f-ea30-49ec-92f6-e2f5532d6a59", + "uuid": "9a3b8d68-2dbb-4253-add9-37744b0a20dc", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -11627,7 +11667,7 @@ ] }, { - "uuid": "c473752f-2409-4315-9404-561ca18c6055", + "uuid": "b473806d-a208-4094-a1c7-73d82c334870", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -11644,7 +11684,7 @@ ] }, { - "uuid": "cb6c8f2f-0b43-4a2d-9a96-08e8e7c49fa7", + "uuid": "b422c04f-105e-4ebf-9234-fcc555486235", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11661,7 +11701,7 @@ ] }, { - "uuid": "a6a4bad0-c3e3-49f6-a274-2a7e45e179fa", + "uuid": "f4f60437-d73f-4c4d-9189-f6092357d0f0", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -11678,7 +11718,7 @@ ] }, { - "uuid": "6312f546-ff39-4ba2-a8cc-169b3cdc48d2", + "uuid": "cae9a2d1-c67e-4759-95b8-cff03cc8d757", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -11695,7 +11735,7 @@ ] }, { - "uuid": "0c92573a-4598-40f0-ab10-4f402f2165b2", + "uuid": "4f783808-cf8b-433b-9b84-f631b283f150", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -11712,7 +11752,7 @@ ] }, { - "uuid": "0a5fff30-22d5-4db1-9ff7-f66c55491572", + "uuid": "f772857d-4fcf-4d5e-a537-46748b1260c0", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -11729,7 +11769,7 @@ ] }, { - "uuid": "0306f762-7d4b-41cd-a092-ba61dd5d1524", + "uuid": "2835eb4f-0de5-4a1c-8eda-45e9e3d12ee3", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -11746,7 +11786,7 @@ ] }, { - "uuid": "9f1c2dda-5186-42ec-bb90-7402b286fd1e", + "uuid": "3aa55676-fa6a-4cfe-86d5-7760a6b2f6c1", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -11763,7 +11803,7 @@ ] }, { - "uuid": "be3ed32b-fa96-4703-8aa0-d9303e11faa6", + "uuid": "49e5c187-ca77-49ac-bb1f-a8569a64be33", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -11780,7 +11820,7 @@ ] }, { - "uuid": "dd5cb2a0-0c8a-40a0-8e8b-532de7335c7a", + "uuid": "883e0a0f-36bd-4a0d-9cc5-2456ba09a91c", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11802,7 +11842,7 @@ ] }, { - "uuid": "f0d459df-5cf4-4201-8d99-b2489f0d6df8", + "uuid": "b7a314de-6637-49de-bc78-841c3b064cfc", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -11815,7 +11855,7 @@ ] }, { - "uuid": "786ed490-3900-486d-82c4-e3248dbd240f", + "uuid": "23b241a2-0b15-4868-b6d5-5a6df4b1724b", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11832,7 +11872,7 @@ ] }, { - "uuid": "d1cb6f62-8cdc-4a00-9594-734a217700f1", + "uuid": "ad0dfe46-3d8b-4174-bb2f-012ccf65b66c", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -11849,7 +11889,7 @@ ] }, { - "uuid": "58825ce9-6863-402a-a641-11b730920ec9", + "uuid": "676c4691-fcef-45f7-8834-e2dfdb77577b", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11866,7 +11906,7 @@ ] }, { - "uuid": "d83a8d3f-d3a9-4640-b662-73e7a6085d0c", + "uuid": "94b768f4-d4b6-4659-98c3-41a1d42894b5", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11888,7 +11928,7 @@ ] }, { - "uuid": "a20b65e9-aae8-47b6-a665-04ecab65e4dc", + "uuid": "0645e3eb-c485-4aac-ada5-9f6f0f0a3693", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -11905,7 +11945,7 @@ ] }, { - "uuid": "db0fc3f4-8b23-4250-9216-8f79652c16c0", + "uuid": "232ffe86-19a6-4e71-bfaa-16df2eb7a0cb", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11927,7 +11967,7 @@ ] }, { - "uuid": "207ce9db-e477-4660-b8d6-0b392183a621", + "uuid": "cd92d3ef-83da-4405-9906-86942969fe66", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11949,7 +11989,7 @@ ] }, { - "uuid": "dd5e9395-77c8-4e40-9d91-4297cbed2eb5", + "uuid": "3bbce20e-fbba-4ff0-97d9-7ef5a9c8bf94", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -11966,7 +12006,7 @@ ] }, { - "uuid": "c4ca818a-6ad8-4e6a-85b3-cb3d3a7638ec", + "uuid": "4fe1718b-6aff-4533-8436-fba67f71bfa6", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11988,7 +12028,7 @@ ] }, { - "uuid": "9d37fd64-e4a1-41db-8350-9b9ad2eb8c77", + "uuid": "54bed3e0-928c-458e-9c28-272acc138380", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -12005,7 +12045,7 @@ ] }, { - "uuid": "adbb5c0d-0a3d-483a-acba-008e8c96fd3c", + "uuid": "f93e5d0b-74b6-4683-8b71-1264a03713db", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -12022,7 +12062,7 @@ ] }, { - "uuid": "973879b4-50cd-4cde-aa6c-0b5211ad01a3", + "uuid": "3869fc3a-0620-4c69-8c28-edc20586817f", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12039,7 +12079,7 @@ ] }, { - "uuid": "ee7eb4ed-512c-4634-affc-bc86c3d56fab", + "uuid": "82299953-4776-494a-a182-f9c0ab2017c3", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12056,7 +12096,7 @@ ] }, { - "uuid": "fd349869-766f-408e-87df-d7188eaac534", + "uuid": "bd7daef6-e7e6-46f8-bc34-e4aad2d4f991", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -12073,7 +12113,7 @@ ] }, { - "uuid": "fa7d15c5-4e1f-43e8-9a15-c938df485679", + "uuid": "ff917135-31d8-4ec2-959c-a3ecff5898ad", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -12095,7 +12135,7 @@ ] }, { - "uuid": "220ba29e-9996-42bb-97da-ab1546374ca5", + "uuid": "31152cca-0f60-4962-b85f-0538a2092da2", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -12112,7 +12152,7 @@ ] }, { - "uuid": "aba04cd9-c189-4b41-8740-6fa98b20a53b", + "uuid": "8a29e332-836e-4fea-a860-fff8fa56555e", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -12134,7 +12174,7 @@ ] }, { - "uuid": "89b02bcf-1eac-4205-b901-c2df955f6153", + "uuid": "bccd111a-b9be-4522-8c2d-08245b871406", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -12151,7 +12191,7 @@ ] }, { - "uuid": "c2d27aa3-ef3a-4f5b-86f1-9b430ddcfe8c", + "uuid": "afa9438d-2b20-4726-bea5-195a17b02630", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12168,7 +12208,7 @@ ] }, { - "uuid": "fe6fd4a7-1682-4821-a142-fc0f5fdd1fc1", + "uuid": "1d586cad-2e70-4231-a16c-373879ab181a", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12195,7 +12235,7 @@ ] }, { - "uuid": "4be83afb-60ba-485f-b8ba-4122624c0cd3", + "uuid": "163b81e5-3579-4a13-bd4b-dd424272a305", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12217,7 +12257,7 @@ ] }, { - "uuid": "842521db-bcff-40f6-9531-9064f49423f9", + "uuid": "97d5afd2-1ba4-4376-9e47-6240ba832cb7", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12234,7 +12274,7 @@ ] }, { - "uuid": "59682286-eeb4-4609-b10a-70e91eb1220e", + "uuid": "abafe20c-d402-465f-a89a-7522cd3df0be", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12251,7 +12291,7 @@ ] }, { - "uuid": "912da062-566f-43a0-9d80-4feebe161731", + "uuid": "f9cb4069-cff0-4243-9e1c-b4b1d7b815e3", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12268,7 +12308,7 @@ ] }, { - "uuid": "0f735fa7-fb50-4054-97d7-9a9b5245b917", + "uuid": "64361f2f-ec75-443c-962c-108e5f435950", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -12281,7 +12321,7 @@ ] }, { - "uuid": "254a52e9-4e26-4637-83df-22d37b650c87", + "uuid": "100be6b9-ff66-4c93-85a0-20961d8862e5", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -12294,7 +12334,7 @@ ] }, { - "uuid": "4d3a28f8-122f-4834-9993-6075d3a95fd8", + "uuid": "73701d98-43e8-47c1-b397-8f7a48c5cebd", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12311,7 +12351,7 @@ ] }, { - "uuid": "74aa6877-9413-4653-bb01-b4d81c729c5d", + "uuid": "2eb68200-fc32-4d74-b8e0-f3506e807cbf", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12328,7 +12368,7 @@ ] }, { - "uuid": "92729d42-0d90-488c-b12e-3aba73113ecc", + "uuid": "5dc02dd0-8322-413e-93cd-5a3263ef2535", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -12341,7 +12381,7 @@ ] }, { - "uuid": "67e2751d-06f4-4412-ae68-7e5d6e51e237", + "uuid": "cd39ff8a-f538-44f8-a620-fb104b8bd2e5", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12358,7 +12398,7 @@ ] }, { - "uuid": "c4cb4523-32ea-4954-ae52-14c978b7e0cc", + "uuid": "ec1a615e-9975-4727-bbd3-65e408fd63f9", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12375,7 +12415,7 @@ ] }, { - "uuid": "1ea85a9a-608a-4097-8605-5c7fd31971b4", + "uuid": "ba3d632a-2d41-4ff0-aca0-f65290abff39", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12392,7 +12432,7 @@ ] }, { - "uuid": "c1a9c1d3-2dd1-47f3-833b-9f672a91f195", + "uuid": "967bb41c-0429-436e-a204-e9f9201937fa", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12409,7 +12449,7 @@ ] }, { - "uuid": "84476ba3-f468-4811-8577-f83726556b69", + "uuid": "c1e63f1f-aa0a-405c-a450-5a098244a9ee", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12426,7 +12466,7 @@ ] }, { - "uuid": "97b161df-6a43-466a-a36c-284caefd0d0f", + "uuid": "b663d756-27dc-43d9-b2be-ca679697e3e3", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -12438,7 +12478,7 @@ ] }, { - "uuid": "a13e35b5-78a8-4c53-9ab2-b7211fd604e5", + "uuid": "5f8bf5da-93c4-4526-8714-f8c565e428ae", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -12450,7 +12490,7 @@ ] }, { - "uuid": "3440c640-b368-4905-a768-3e2eeb8f22bf", + "uuid": "fd24424b-f81f-45ee-9b9a-c06c50b4ddd1", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -12462,7 +12502,7 @@ ] }, { - "uuid": "5c4b00e8-1c43-494e-9a48-eff987a7d5b1", + "uuid": "27b6dfcf-d691-4ead-a85b-937c58744306", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -12474,7 +12514,7 @@ ] }, { - "uuid": "ce60a76b-1a4f-4923-b7a8-bdd96cae80b1", + "uuid": "f9e72839-0f6d-472d-a0be-2a9afce78693", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -12487,7 +12527,7 @@ ] }, { - "uuid": "a0edaf23-ace1-467c-b07e-35fce9175ead", + "uuid": "082f6e89-4d55-4619-b710-0315e05984af", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -12500,7 +12540,7 @@ ] }, { - "uuid": "6b324a58-59b0-4ced-9d5d-d07f0f9be268", + "uuid": "dd6accbb-792e-4b2c-81e9-59251f6d22cf", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -12512,7 +12552,7 @@ ] }, { - "uuid": "e958eed4-534d-49df-8ffc-06ce36562794", + "uuid": "6f2930fa-5ef6-4b1b-b8df-e0fef539ff23", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -12525,7 +12565,7 @@ ] }, { - "uuid": "37f710ac-3e74-4a0a-b268-c568bd3c6f2b", + "uuid": "edd651ac-6709-41ed-8be9-f775cdbd1475", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12552,7 +12592,7 @@ ] }, { - "uuid": "fe8bb026-bf44-4557-961a-9936542ff6ac", + "uuid": "4ba6bcdd-4ed0-45c3-a0b1-66da53fd2f36", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12579,7 +12619,7 @@ ] }, { - "uuid": "0450ad1e-44ef-4b29-89f9-ed38ee4072e9", + "uuid": "9fde4292-4a11-488b-8dcc-ebdfff860bb2", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12606,7 +12646,7 @@ ] }, { - "uuid": "8d544289-4000-4e9a-8760-91e2c7f776cf", + "uuid": "49476c3f-a19f-45bd-957b-15500c1a5b54", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12633,7 +12673,7 @@ ] }, { - "uuid": "7369ab9b-516e-4511-a85f-808ce15ebb66", + "uuid": "ea4c8eb1-f53b-433d-8e6e-7fe7dcdae2cf", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12660,7 +12700,7 @@ ] }, { - "uuid": "5af20025-bcd0-47cb-b773-04f31f68777b", + "uuid": "0b5b4cd9-7f54-49ac-aa48-f66b07ade480", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12687,7 +12727,7 @@ ] }, { - "uuid": "b041ccbe-6696-4155-9cb0-a5ae66e2c800", + "uuid": "5570a6ed-28a5-4cb9-bb68-99a77d33abf8", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12714,7 +12754,7 @@ ] }, { - "uuid": "f016117e-88da-4d6c-999e-56da60f7edf3", + "uuid": "a802a8d1-7cd2-45e6-b593-6c97cbc60491", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12741,7 +12781,7 @@ ] }, { - "uuid": "35486cde-4a9a-4ebb-ae9b-34d72b3942a9", + "uuid": "96b99a3c-10c5-47a7-9d8a-f88b0c231fd4", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12768,7 +12808,7 @@ ] }, { - "uuid": "df23fe3e-6b72-4016-8d87-a1da9dee6f55", + "uuid": "cfe8f5fc-32a1-45db-91e2-9df36065d0fc", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12795,7 +12835,7 @@ ] }, { - "uuid": "ed4a51d7-422e-4520-aa28-2ba0a6964f73", + "uuid": "c9b1b9ad-0dda-462d-b117-9881c538c0a6", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12837,7 +12877,7 @@ ] }, { - "uuid": "b1163617-1d7f-44ae-ad19-f77308827024", + "uuid": "29b21590-20a8-4b01-804d-f7305a8b165c", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12859,7 +12899,7 @@ ] }, { - "uuid": "b0018fc0-438f-4320-9245-4f3c1bf55c10", + "uuid": "470f5507-0360-4ce0-8901-329c26b7c305", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12881,7 +12921,7 @@ ] }, { - "uuid": "631712ec-9f02-46bd-a690-3162ea4e301e", + "uuid": "2ecc3b4a-7e39-46e3-8323-d11c380052fd", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -12894,7 +12934,7 @@ ] }, { - "uuid": "03cb9525-318d-44b5-b0aa-1bf53656572d", + "uuid": "deec7e79-a172-4865-86a2-0c6b20cc02d2", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12911,7 +12951,7 @@ ] }, { - "uuid": "131575b8-bc56-43c6-a928-fcab0dfa2e23", + "uuid": "1493272f-f7a2-4444-bf16-aa979c1c228b", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12928,7 +12968,7 @@ ] }, { - "uuid": "58017978-f32e-45ba-a612-56998fbd4de8", + "uuid": "eaafd743-5ce3-4059-aef3-4a69e1098dda", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12945,7 +12985,7 @@ ] }, { - "uuid": "fc96b7a3-005d-457c-a5d5-afab9a46318d", + "uuid": "6906f7c2-6d5a-4707-8887-ed50bf5f2fc2", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12962,7 +13002,7 @@ ] }, { - "uuid": "eb63f108-464e-42e4-a102-42a60ce7702a", + "uuid": "0f0039bc-a946-4114-8f1b-16b24a764e30", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12979,7 +13019,7 @@ ] }, { - "uuid": "de7fbf78-fb46-4a6b-91cc-999d010e2cc7", + "uuid": "7da1663a-3ab4-45c5-b008-7c1450243fad", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12996,7 +13036,7 @@ ] }, { - "uuid": "54cf321c-9d21-4452-92ae-82fdc5db120e", + "uuid": "40043528-1d4f-4a96-82a6-ae521bef19dd", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -13013,7 +13053,7 @@ ] }, { - "uuid": "9ab77d88-7f95-4aff-b85a-538324abfc79", + "uuid": "067115bf-1011-4ea8-891b-f90f702763d0", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -13040,7 +13080,7 @@ ] }, { - "uuid": "63bf208d-c540-4723-9cb7-7294a69d8f5d", + "uuid": "13ed4812-46ce-4ebf-9f23-10663266e1f8", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -13141,103 +13181,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -13249,67 +13289,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -13321,13 +13361,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -13339,13 +13379,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -13357,31 +13397,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -13393,49 +13433,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -13447,13 +13487,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -13465,31 +13505,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -13501,13 +13541,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -13519,13 +13559,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -13537,13 +13577,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -13555,13 +13595,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -13573,13 +13613,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -13591,13 +13631,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -13609,427 +13649,427 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_minimum_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum age of password in days", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_minimum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Minimum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_dir", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The directory where the user files with the failure records are kept", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_dir", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "The directory where the user files with the failure records are kept", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_audit_backlog_limit", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 8192, 8192: 8192}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_admin_space_left_action", + "value": "var_audit_backlog_limit", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", + "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", + "value": "{'default': 8192, 8192: 8192}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_error_action", + "value": "var_auditd_admin_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", + "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_full_action", + "value": "var_auditd_disk_error_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file", + "value": "var_auditd_disk_full_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file in /etc/audit/auditd.conf", + "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file_action", + "value": "var_auditd_max_log_file", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", + "value": "The setting for max_log_file in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", + "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_space_left_action", + "value": "var_auditd_max_log_file_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for space_left_action in /etc/audit/auditd.conf", + "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", + "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_auditd_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "The setting for space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -14041,251 +14081,269 @@ { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_postfix_inet_interfaces", + "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { "name": "Parameter_Description_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for inet_interfaces in /etc/postfix/main.cf", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", + "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_screensaver_lock_delay", + "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { "name": "Parameter_Description_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", + "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", + "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_policy_name", + "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { "name": "Parameter_Description_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", + "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_state", + "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { "name": "Parameter_Description_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", + "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_59", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_selinux_state", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_59", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_59", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'enforcing', 'disabled': 'disabled', 'enforcing': 'enforcing', 'permissive': 'permissive'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_59", + "name": "Parameter_Id_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_59", + "name": "Parameter_Description_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_59", + "name": "Parameter_Value_Alternatives_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_60", + "name": "Parameter_Id_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_60", + "name": "Parameter_Description_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_60", + "name": "Parameter_Value_Alternatives_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_61", + "name": "Parameter_Id_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_61", + "name": "Parameter_Description_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_61", + "name": "Parameter_Value_Alternatives_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_62", + "name": "Parameter_Id_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_62", + "name": "Parameter_Description_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_62", + "name": "Parameter_Value_Alternatives_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_63", + "name": "Parameter_Id_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_63", + "name": "Parameter_Description_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_63", + "name": "Parameter_Value_Alternatives_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_64", + "name": "Parameter_Id_65", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_user_initialization_files_regex", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_64", + "name": "Parameter_Description_65", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_64", + "name": "Parameter_Value_Alternatives_65", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" @@ -14965,9799 +15023,9823 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "disable_weak_deps", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "disable_weak_deps", "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_setroubleshoot_removed", + "value": "package_mcstrans_removed", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall setroubleshoot Package", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_setroubleshoot_removed", + "value": "package_mcstrans_removed", "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall setroubleshoot Package", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_setroubleshoot_removed", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall setroubleshoot Package", "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_setroubleshoot_removed", "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall setroubleshoot Package", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "banner_etc_issue_cis", + "remarks": "rule_set_054" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure Local Login Warning Banner Is Configured Properly", + "remarks": "rule_set_054" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "banner_etc_issue_cis", + "remarks": "rule_set_054" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_054" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "banner_etc_issue_net_cis", + "remarks": "rule_set_055" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_var_lib_selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in /var/lib/selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_var_lib_selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in /var/lib/selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_create", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - create_module", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_create", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - create_module", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_433" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_433" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_433" + "remarks": "rule_set_434" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_434" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_433" + "remarks": "rule_set_434" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_435" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_434" + "remarks": "rule_set_435" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_435" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_434" + "remarks": "rule_set_435" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_436" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_435" + "remarks": "rule_set_436" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_436" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_435" + "remarks": "rule_set_436" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_437" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_436" + "remarks": "rule_set_437" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_437" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_436" + "remarks": "rule_set_437" } ], "control-implementations": [ { - "uuid": "bd026360-3d9d-4703-9720-df6acff296f1", + "uuid": "f8aef265-cf13-41e1-9046-bbe471198af2", "source": "trestle://profiles/fedora-cis_fedora-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -24775,17 +24857,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -25161,7 +25249,7 @@ ], "implemented-requirements": [ { - "uuid": "db801aaa-ce52-4d2e-9540-c8e778b68132", + "uuid": "128d0aa5-5cca-4621-8d2a-a1845e6027e5", "control-id": "cis_fedora_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -25178,7 +25266,7 @@ ] }, { - "uuid": "a7d01f9d-705e-4d36-8521-2ee5d34b2a6b", + "uuid": "82d11b23-13f2-4729-b263-3921ae8381e8", "control-id": "cis_fedora_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -25195,7 +25283,7 @@ ] }, { - "uuid": "259cf302-db25-477d-a709-d931d800e11a", + "uuid": "f2eef8c5-9e02-4b65-b650-8b8197c5131f", "control-id": "cis_fedora_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -25212,7 +25300,7 @@ ] }, { - "uuid": "af1e4d82-b0dd-4bba-a1e2-7e582eba0c95", + "uuid": "5afdcc06-e413-4765-b6f1-2393c81c7056", "control-id": "cis_fedora_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25229,7 +25317,7 @@ ] }, { - "uuid": "c3b01ce3-a323-4c17-b030-fe62287d6181", + "uuid": "13fe6da2-328e-456f-bdac-ef7e6a172288", "control-id": "cis_fedora_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25246,7 +25334,7 @@ ] }, { - "uuid": "dac36d54-77af-4fbd-a321-ea64f6f1dc67", + "uuid": "99418875-ab02-44e8-8959-73f386940304", "control-id": "cis_fedora_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25263,7 +25351,7 @@ ] }, { - "uuid": "43380bc8-4a9f-45cb-9d21-ae7a01dd2f74", + "uuid": "66dada70-f659-4b12-ba53-a02eeaf2a978", "control-id": "cis_fedora_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25280,7 +25368,7 @@ ] }, { - "uuid": "5aee09ec-a411-43ab-8a37-e6c9e8453d39", + "uuid": "94e71913-910d-4873-aae6-03db85df2ff3", "control-id": "cis_fedora_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25297,7 +25385,7 @@ ] }, { - "uuid": "7ca59dfc-7e28-40a8-9b21-b49eba4d2418", + "uuid": "9c12a8e4-6112-4d40-8810-dcc8ae1d8567", "control-id": "cis_fedora_1-2.1.3", "description": "The description for control-id cis_fedora_1-2.1.3.", "props": [ @@ -25310,7 +25398,7 @@ ] }, { - "uuid": "cc9355d8-6d2c-458e-a2cb-521a27e31de2", + "uuid": "caa0161b-34d9-4a17-8a0e-c92fae10c4b5", "control-id": "cis_fedora_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25327,7 +25415,7 @@ ] }, { - "uuid": "8c652d11-1c6a-4c3e-90d5-3bda923e8e73", + "uuid": "1b14d430-0281-453e-b47f-b0ff6cfba205", "control-id": "cis_fedora_1-3.1.6", "description": "The description for control-id cis_fedora_1-3.1.6.", "props": [ @@ -25340,7 +25428,7 @@ ] }, { - "uuid": "5fb2edff-908c-44ee-8bcb-55cd5aba8bb7", + "uuid": "2837294f-b17e-4def-ba12-7d23f628dad9", "control-id": "cis_fedora_1-8.7", "description": "No notes for control-id 1.8.7.", "props": [ @@ -25357,7 +25445,7 @@ ] }, { - "uuid": "497da7ca-b8ac-4b99-9a33-9350fafb0c03", + "uuid": "dd029d12-6834-44d7-a4c3-8e22f6e76cab", "control-id": "cis_fedora_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25374,7 +25462,7 @@ ] }, { - "uuid": "d1a5d42d-aacd-4f94-90b7-a501ab2f689f", + "uuid": "f1d648c4-871b-49c0-b2e4-e6d91c20eb07", "control-id": "cis_fedora_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -25391,7 +25479,7 @@ ] }, { - "uuid": "07532d08-81b1-43a2-88e9-a1b2618a7146", + "uuid": "40838614-9e30-43ef-a4b3-5016b33a0bbe", "control-id": "cis_fedora_2-1.22", "description": "No notes for control-id 2.1.22.", "props": [ @@ -25408,7 +25496,7 @@ ] }, { - "uuid": "6447a37c-d2df-491f-86ce-7841cad6b0c6", + "uuid": "8b1b8280-803b-4049-82d3-17f56a17e24f", "control-id": "cis_fedora_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25425,7 +25513,7 @@ ] }, { - "uuid": "8936ac87-ff69-4782-91e2-788eaf5091c6", + "uuid": "32833fac-f8e8-4ad9-8cd6-15d42cb99f26", "control-id": "cis_fedora_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -25442,7 +25530,7 @@ ] }, { - "uuid": "b432f127-6bae-4bd1-acb8-ca36199bab4b", + "uuid": "c1808738-7d7c-480b-bb71-b2095d226537", "control-id": "cis_fedora_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -25459,7 +25547,7 @@ ] }, { - "uuid": "0033bd04-50ae-478f-aa4e-5b724f0104ee", + "uuid": "e6c4411f-f7dd-4a07-aff3-3319dc25651b", "control-id": "cis_fedora_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -25476,7 +25564,7 @@ ] }, { - "uuid": "c181db00-88a3-41f9-a6c9-4821dacfb183", + "uuid": "f411c547-906b-470d-afb6-f1f8caa41431", "control-id": "cis_fedora_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -25493,7 +25581,7 @@ ] }, { - "uuid": "10c1464c-0aea-422d-9ed5-38dc8bc45e63", + "uuid": "79a47ed7-3cad-45bc-a8cb-a3f3ddb89f68", "control-id": "cis_fedora_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25510,7 +25598,7 @@ ] }, { - "uuid": "59e8c7f5-3895-4c42-85cb-edb725971079", + "uuid": "d172b03a-965b-4ad3-b0c4-c007dfd576de", "control-id": "cis_fedora_5-3.3.1.3", "description": "No notes for control-id 5.3.3.1.3.", "props": [ @@ -25527,7 +25615,7 @@ ] }, { - "uuid": "79b502d0-7715-452f-8fe1-ed220c50843f", + "uuid": "5da66a9a-b6c6-40d7-b80b-8bd1d60a8a1d", "control-id": "cis_fedora_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25549,7 +25637,7 @@ ] }, { - "uuid": "f59d0803-dc32-4577-bac6-203aee58f59f", + "uuid": "3634e5d5-8bc5-4b82-a7ca-28c53b77133b", "control-id": "cis_fedora_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25566,7 +25654,7 @@ ] }, { - "uuid": "66f5a986-9b6e-426f-a00e-8422da6ddb55", + "uuid": "44b7a159-e148-4b35-b674-d7b3a003ab80", "control-id": "cis_fedora_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25588,7 +25676,7 @@ ] }, { - "uuid": "1b8ae0f0-55e7-48ae-91eb-853f7a38b1fc", + "uuid": "f6d4ef82-57c4-4e9b-85ec-db7811d44046", "control-id": "cis_fedora_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25605,7 +25693,7 @@ ] }, { - "uuid": "68e53dcf-44d4-419a-baa0-11ee5074695a", + "uuid": "40903ff4-c6a4-4502-a3bb-047c80ccc80a", "control-id": "cis_fedora_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25622,7 +25710,7 @@ ] }, { - "uuid": "ec6ffc31-94cc-44b3-84ee-cb79ff1c4365", + "uuid": "20d7c514-5be6-4ae5-9487-8d7735f54239", "control-id": "cis_fedora_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25639,7 +25727,7 @@ ] }, { - "uuid": "007d5a5c-c63b-4171-9764-c39fa0d50f8f", + "uuid": "ac0035df-cb40-4009-ae2a-6faa74254a54", "control-id": "cis_fedora_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25656,7 +25744,7 @@ ] }, { - "uuid": "f50aefea-671b-483c-ac7f-dc627fcc3fbd", + "uuid": "c3b725c6-082a-40ca-9955-2a7cb4122c73", "control-id": "cis_fedora_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25673,7 +25761,7 @@ ] }, { - "uuid": "48bf118d-351e-4499-94f6-14bc9038aa6b", + "uuid": "ea60accf-40e1-4763-bf69-ca89a6258fe4", "control-id": "cis_fedora_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25695,7 +25783,7 @@ ] }, { - "uuid": "2d14bb35-3ea2-41a6-977a-65462360340f", + "uuid": "7329f244-86b8-4aba-8695-0ceb0e4a4a13", "control-id": "cis_fedora_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25717,7 +25805,7 @@ ] }, { - "uuid": "eb1f4e4c-663c-42ed-8c98-052c84afba3b", + "uuid": "598f4278-acf0-446d-9aac-b19a8e076368", "control-id": "cis_fedora_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25734,7 +25822,7 @@ ] }, { - "uuid": "cf3f0615-a211-4022-a84d-4cd1cc6184bb", + "uuid": "897f5a36-cfc2-4e8b-9772-db2fc0eafdac", "control-id": "cis_fedora_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25751,7 +25839,7 @@ ] }, { - "uuid": "025244d1-fa13-4c81-9f0b-71381d1a84b9", + "uuid": "db1909c3-b80a-4043-8608-65ef823c55c3", "control-id": "cis_fedora_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25768,7 +25856,7 @@ ] }, { - "uuid": "dd10ee9c-6ab4-4025-be01-079b843144da", + "uuid": "184bf5c9-265f-478e-9661-4f927eaa36f0", "control-id": "cis_fedora_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25800,7 +25888,7 @@ ] }, { - "uuid": "b3a46184-41f7-4103-ad5a-c5a7dc656902", + "uuid": "b1499174-b891-4e77-a4ea-b64134ec5d23", "control-id": "cis_fedora_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25822,7 +25910,7 @@ ] }, { - "uuid": "4d4210a2-9261-49a7-8eb4-edc7e8497bba", + "uuid": "7b47016d-d806-4330-8e64-65deee9e637b", "control-id": "cis_fedora_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25844,7 +25932,7 @@ ] }, { - "uuid": "6c86a081-e2bf-4529-92a5-81253d9c3f74", + "uuid": "eb18fb2f-93d3-4ccc-85d8-a7e3cc0eda4d", "control-id": "cis_fedora_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25866,7 +25954,7 @@ ] }, { - "uuid": "c9c5ae96-81b0-4d2c-b4fb-d31b1fcce163", + "uuid": "6446973b-997b-489c-923e-527d0beb49b8", "control-id": "cis_fedora_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25888,7 +25976,7 @@ ] }, { - "uuid": "04f18803-3304-4fee-b0f4-49a52a39f981", + "uuid": "3267cda8-23c5-49b9-9671-40f80fb59de4", "control-id": "cis_fedora_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25905,7 +25993,7 @@ ] }, { - "uuid": "7e5be7ca-8a73-421d-86d9-8c1db07eddc6", + "uuid": "ea58a961-2aba-44bb-902f-14c1b9a1865f", "control-id": "cis_fedora_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25922,7 +26010,7 @@ ] }, { - "uuid": "c8fe56f5-3703-4575-8ccf-a82be1abdda2", + "uuid": "bdbe0685-d282-4bd1-9a16-f9a5b908a792", "control-id": "cis_fedora_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25959,7 +26047,7 @@ ] }, { - "uuid": "c95925dc-523d-498f-8e42-be408fc457a1", + "uuid": "46d8fa57-aa75-408c-8b55-265901a464ad", "control-id": "cis_fedora_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25976,7 +26064,7 @@ ] }, { - "uuid": "c0f03112-bb35-41c2-9b93-bcf7fe15d6d0", + "uuid": "060e64d6-ba6b-4873-82ba-63107a93a25e", "control-id": "cis_fedora_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25993,7 +26081,7 @@ ] }, { - "uuid": "fd0f8eb8-643b-4d87-889d-b3e0b8d86e7c", + "uuid": "7a6c0847-98e9-4867-8ba8-a01db8c3b82c", "control-id": "cis_fedora_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -26015,7 +26103,7 @@ ] }, { - "uuid": "562679c1-3e04-413b-8d2f-471d18dfe66e", + "uuid": "b52588aa-5686-43d0-b9a4-632e7e52e876", "control-id": "cis_fedora_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -26032,7 +26120,7 @@ ] }, { - "uuid": "05f0a60a-83df-4cc1-b504-174013e15f82", + "uuid": "f856261d-48bd-4a40-9057-1eb0280989c8", "control-id": "cis_fedora_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -26049,7 +26137,7 @@ ] }, { - "uuid": "ac40f813-630c-425c-9f61-5759ed3c7279", + "uuid": "61ca92df-d021-4dac-8385-87df80669df6", "control-id": "cis_fedora_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -26071,7 +26159,7 @@ ] }, { - "uuid": "a8b4d1e6-20bb-42a2-b0e5-683bf19b69e7", + "uuid": "dc495bc0-7f07-4c1d-9f36-fab13ae54b8b", "control-id": "cis_fedora_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -26153,7 +26241,7 @@ ] }, { - "uuid": "9d19da75-235e-4cb0-a8b9-20df82a9bb87", + "uuid": "e44c5d25-caeb-4940-bc1b-9806e99f35ba", "control-id": "cis_fedora_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -26170,7 +26258,7 @@ ] }, { - "uuid": "485e1022-c2a0-459e-a875-194d840bed11", + "uuid": "cc2b0562-2bb3-405c-8e20-abb01038b488", "control-id": "cis_fedora_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -26197,7 +26285,7 @@ ] }, { - "uuid": "923e1983-d69a-4754-a525-0686229c6132", + "uuid": "5991513b-1a0f-47e1-aadb-c900058d4a8d", "control-id": "cis_fedora_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -26219,7 +26307,7 @@ ] }, { - "uuid": "a0e246c0-2e0b-4e04-a3f4-358a90bbd8be", + "uuid": "396cce78-af4a-4f61-915a-f74651ef2951", "control-id": "cis_fedora_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26256,7 +26344,7 @@ ] }, { - "uuid": "4ea4c776-1699-42e3-9186-0646c739f8b2", + "uuid": "462b339d-2543-4179-b578-6f5d3d53fac9", "control-id": "cis_fedora_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26283,7 +26371,7 @@ ] }, { - "uuid": "223f45e5-869b-4f7c-8880-2cde9c3ee01a", + "uuid": "a010949c-c812-4980-806b-c10e8b6463f3", "control-id": "cis_fedora_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26300,7 +26388,7 @@ ] }, { - "uuid": "737bd9a1-c2c0-43f4-bf18-c7c99c667b95", + "uuid": "28e78185-1766-444f-9114-2b59e75ae940", "control-id": "cis_fedora_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26317,7 +26405,7 @@ ] }, { - "uuid": "f66f3cf6-7934-490c-a434-37b176175ef8", + "uuid": "3f232bdd-839e-4b09-8717-58be55cb0a34", "control-id": "cis_fedora_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26334,7 +26422,7 @@ ] }, { - "uuid": "bc13e3b8-9e86-49f2-ae82-3016ac42ecef", + "uuid": "5d473653-fa3b-448e-8208-b31763440e19", "control-id": "cis_fedora_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26351,7 +26439,7 @@ ] }, { - "uuid": "80f75aa2-5f30-4b75-92b2-938f609ae175", + "uuid": "37b68853-02aa-46c1-a368-d267d2c5eaa4", "control-id": "cis_fedora_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26368,7 +26456,7 @@ ] }, { - "uuid": "a73e8c04-a474-4088-82fe-aae602d1b37e", + "uuid": "006cdde9-2a59-4be7-ae13-01a1c6cdb4e5", "control-id": "cis_fedora_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26390,7 +26478,7 @@ ] }, { - "uuid": "8be82e2c-fd3a-4695-9089-be087f70bc87", + "uuid": "cc4f7f13-4927-46f1-9701-d0a588b09adc", "control-id": "cis_fedora_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26407,7 +26495,7 @@ ] }, { - "uuid": "7e910cd1-428b-4e3d-a6a2-6278b81407fd", + "uuid": "cee2fff9-9b3a-4130-b3e2-9edd4014dea3", "control-id": "cis_fedora_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26429,7 +26517,7 @@ ] }, { - "uuid": "fde6554a-6e04-46cc-9d7d-be4153f310eb", + "uuid": "c37eb941-7389-4dff-b960-ab03b72412ae", "control-id": "cis_fedora_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26446,7 +26534,7 @@ ] }, { - "uuid": "3fcf5e8e-1f46-4ed5-9662-556e92083335", + "uuid": "623d23d8-e7ae-4c83-9796-9bef8956b276", "control-id": "cis_fedora_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26463,7 +26551,7 @@ ] }, { - "uuid": "05c54905-92e4-452e-8d75-1e6abf0a6d74", + "uuid": "a402d395-2c68-45d7-b25a-f7ef85dd6703", "control-id": "cis_fedora_6-3.3.34", "description": "The description for control-id cis_fedora_6-3.3.34.", "props": [ @@ -26476,7 +26564,7 @@ ] }, { - "uuid": "e98163e5-1371-4270-a0aa-e49f5ade8270", + "uuid": "ef296b97-bc23-4356-96a8-ad9dc09d8af9", "control-id": "cis_fedora_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26493,7 +26581,7 @@ ] }, { - "uuid": "58fdba4b-f65e-4dea-ad28-6c71e31a4b10", + "uuid": "a2ad8299-3f45-4aaf-9ea8-870e47c07f3e", "control-id": "cis_fedora_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26510,7 +26598,7 @@ ] }, { - "uuid": "ec7fab42-7486-4827-a278-44e96f1c3070", + "uuid": "7d392edb-eca8-42f7-9f2d-211d17bf8c31", "control-id": "cis_fedora_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26527,7 +26615,7 @@ ] }, { - "uuid": "dc2cd34b-5d74-4269-877c-93e9ed86650b", + "uuid": "6869de84-7994-430f-9df7-edf359b9e40a", "control-id": "cis_fedora_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26544,7 +26632,7 @@ ] }, { - "uuid": "48bb2681-34de-46b4-b935-00639f871cf3", + "uuid": "f60d0d72-d956-4c77-b954-76d83a6575a5", "control-id": "cis_fedora_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26561,7 +26649,7 @@ ] }, { - "uuid": "089a0deb-67c8-4b88-9360-8555625460c7", + "uuid": "a11e963b-63de-4093-9e41-57ce4c0df941", "control-id": "cis_fedora_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26578,7 +26666,7 @@ ] }, { - "uuid": "ca776a08-a07e-4075-af9f-6c32927e13e6", + "uuid": "e4ed73ec-e501-440d-bea8-24d4c5e155cf", "control-id": "cis_fedora_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26595,7 +26683,7 @@ ] }, { - "uuid": "eeb119da-6fc1-4cfc-99b6-977fe3427d48", + "uuid": "ca61cdfc-e1c3-4f9e-8fed-19d07780145e", "control-id": "cis_fedora_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26612,7 +26700,7 @@ ] }, { - "uuid": "578de08d-93bb-4b99-85af-2f6c23c523ad", + "uuid": "45741410-0ae3-43d7-9a6a-b3d4cdbeaf78", "control-id": "cis_fedora_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26629,7 +26717,7 @@ ] }, { - "uuid": "9185c9f0-0238-408a-b690-49ad042ff3e5", + "uuid": "7d23c34f-20ec-4c23-b5c5-a85b0f182cab", "control-id": "cis_fedora_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26646,7 +26734,7 @@ ] }, { - "uuid": "9747e8e0-9ea7-4118-aedd-c29977f4c712", + "uuid": "9f26c258-a8ad-4f63-bc43-e3c60ff259bf", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26663,7 +26751,7 @@ ] }, { - "uuid": "4b62491f-6c34-4ac3-84bf-0bf532c6b21f", + "uuid": "39b35254-f3e2-4b3d-85aa-80fbb98630d0", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26680,7 +26768,7 @@ ] }, { - "uuid": "6edd1c4b-bba4-4e55-af52-a1ed0ff83ecf", + "uuid": "7cf0c301-9bed-4282-a9be-5960cb0cc11a", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26697,7 +26785,7 @@ ] }, { - "uuid": "94ecaf3c-3ce6-4d77-92fb-f0cbd90823b8", + "uuid": "008d4263-b702-4241-b32c-edcd93619488", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26714,7 +26802,7 @@ ] }, { - "uuid": "c25b7dbf-a565-47cc-9a26-cfebb5774271", + "uuid": "6877e7f8-32ff-4ba4-bd53-5ce5f6460798", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26731,7 +26819,7 @@ ] }, { - "uuid": "7d38917d-7e8f-4de5-accc-4290fb2ea48c", + "uuid": "c25c8a4a-19d1-4a93-aba4-9988256ead05", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26748,7 +26836,7 @@ ] }, { - "uuid": "42dddcfd-b657-4256-a0b8-7c808cef6bf9", + "uuid": "00e818bd-71c4-4c9e-a5e6-65a3e6632ab7", "control-id": "cis_fedora_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -26765,7 +26853,7 @@ ] }, { - "uuid": "d58ae843-1235-464e-a5a2-98e97eb32de2", + "uuid": "f2bf0334-68a3-483d-9224-5b024c867425", "control-id": "cis_fedora_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -26782,7 +26870,7 @@ ] }, { - "uuid": "16a9dfd2-6a36-4d00-890c-21b09a9b9d56", + "uuid": "9e03dcb9-8eef-4387-bae3-2191c3ff2a95", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -26795,7 +26883,7 @@ ] }, { - "uuid": "6dd0a333-fb2e-49c1-b0f4-5533c30d252a", + "uuid": "2d032097-cfab-455b-898b-3ce1057581a8", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26812,7 +26900,7 @@ ] }, { - "uuid": "15d1406f-e56e-46dd-9e4f-bdbc0f6bb4fc", + "uuid": "9c33c62b-49bd-4896-9e29-fb7f4499e921", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26829,7 +26917,7 @@ ] }, { - "uuid": "7d9fa774-1628-4d56-9387-fafe44d71a67", + "uuid": "74fdba2e-5b6c-41c6-a521-8579fadc3c5f", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26846,7 +26934,7 @@ ] }, { - "uuid": "5beb10c0-4778-43c4-8a12-d5825d29b3b1", + "uuid": "6fb4e3bc-dd38-41bf-8887-0f50e16cf1ac", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26863,7 +26951,7 @@ ] }, { - "uuid": "a4652a36-330a-4793-b163-4077a2ea7c7f", + "uuid": "2eb97da1-d988-4292-b421-f712e7002510", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26880,7 +26968,7 @@ ] }, { - "uuid": "5c36b3e1-dbe7-4570-8ab8-403e341bd9c6", + "uuid": "56ac73aa-2b91-42a8-aad9-087833d96514", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26897,7 +26985,7 @@ ] }, { - "uuid": "aded05e7-4a09-4eb2-b1db-ae3887876660", + "uuid": "896c5f91-5ce5-4161-b669-d686c8256d9d", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26914,7 +27002,7 @@ ] }, { - "uuid": "5c04b6cf-8e1b-4eb8-804c-a11846ad63be", + "uuid": "9d8db875-7d73-4c42-895c-beb88448ffe2", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26931,7 +27019,7 @@ ] }, { - "uuid": "7f66f7b1-4502-4d2c-9dec-2f55977e20c2", + "uuid": "ab7304c7-f5c6-4825-83c7-8d6472d24a9f", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26948,7 +27036,7 @@ ] }, { - "uuid": "72767fe2-ccd3-48b4-8183-ca7d8e8756cb", + "uuid": "4d53854c-ad60-4901-acc4-5461d8429f33", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26965,7 +27053,7 @@ ] }, { - "uuid": "75f74e82-a91a-4354-b89e-e40221872d4e", + "uuid": "61f86501-6a65-4908-937b-a58dc5d9d775", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -26982,7 +27070,7 @@ ] }, { - "uuid": "a1008569-9aa5-43c3-b9f9-eaab00b68ac6", + "uuid": "6429b689-fe38-4ab7-a607-0d3c8f70d37f", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -26999,7 +27087,7 @@ ] }, { - "uuid": "4d6bcbe6-7ef9-4791-bb72-a7a6de0bd7a0", + "uuid": "d462b11b-e99f-4f2c-8494-fec246fdd1a5", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -27016,7 +27104,7 @@ ] }, { - "uuid": "1f866ec2-f79b-4ab4-abc3-b6d3008f896b", + "uuid": "8736efd5-bb0e-4a2a-9084-9906390efe5e", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -27033,7 +27121,7 @@ ] }, { - "uuid": "331879bd-e5f3-42ed-a3b7-5c28e406fce2", + "uuid": "795aab68-3cf9-4c40-abc8-e49033995999", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -27050,7 +27138,7 @@ ] }, { - "uuid": "b25dc461-8721-4725-a5e2-53cc184da472", + "uuid": "c16aa0ad-bc59-418b-926a-01ccbbf932ee", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -27067,7 +27155,7 @@ ] }, { - "uuid": "f0f71ddf-a11b-4dea-9800-e12d9c0a7ddf", + "uuid": "657e76f6-ea1c-4117-9bcb-915e6417584d", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -27084,7 +27172,7 @@ ] }, { - "uuid": "8daf5810-e664-4663-8ade-a4f61a3565e3", + "uuid": "17fc6535-e595-468d-9d1b-0745545dc303", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -27101,7 +27189,7 @@ ] }, { - "uuid": "476f306e-d40f-4693-b07c-07eba85a10bf", + "uuid": "ce8bfb34-e27e-41bc-9268-c1e99f017824", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -27118,7 +27206,7 @@ ] }, { - "uuid": "22743a2d-d465-4d2b-a07d-9c58baf9737b", + "uuid": "628f0939-afa6-49e7-8dee-59d7353132eb", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -27135,7 +27223,7 @@ ] }, { - "uuid": "9b531af0-1b78-4458-9c70-5ce36e94c26e", + "uuid": "87a2c170-f974-478c-bd91-e7a2ea258c39", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -27152,20 +27240,24 @@ ] }, { - "uuid": "ea077258-eae1-4a6a-a72e-572c370de26a", + "uuid": "59b0eb9a-bfad-4087-9a66-69ade341eaeb", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "97c1b662-6497-4557-8383-d220a3311d07", + "uuid": "4ee57c63-1b3a-4e1b-baac-2dfb51243cfb", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -27182,7 +27274,7 @@ ] }, { - "uuid": "c5b67196-6fe4-4f99-a43f-52fed3142c3b", + "uuid": "47ae6b06-2c50-4533-b455-4f0f38b81b80", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -27195,7 +27287,7 @@ ] }, { - "uuid": "fa35a066-3493-4e8e-9e8a-be08c01665b2", + "uuid": "5a846093-bc14-43a0-84e1-991e3378d8dc", "control-id": "cis_fedora_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -27212,7 +27304,7 @@ ] }, { - "uuid": "1900679b-dc62-466b-bfe6-4226024555ce", + "uuid": "654d5dca-ad5a-4335-867f-6d1dde0e3e65", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -27225,7 +27317,7 @@ ] }, { - "uuid": "e4947b0f-e756-4e44-ae92-8d50f96c5765", + "uuid": "9cb66b40-3a5c-4333-ae83-28ee409b4f9c", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27242,7 +27334,7 @@ ] }, { - "uuid": "2fd0ec40-3962-4532-b2be-b89e86daa401", + "uuid": "9f369a50-e8e0-4f28-8df1-2f2bbf5e85cf", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27259,7 +27351,7 @@ ] }, { - "uuid": "6d33b5de-b7a1-4c22-9472-f5e04f444902", + "uuid": "6b55028c-f403-46f8-9af0-8653db92e722", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27276,7 +27368,7 @@ ] }, { - "uuid": "7497fe36-9600-4b06-b107-8b3234e28607", + "uuid": "568d7d35-f547-41de-ae23-f8e4f0307091", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27293,7 +27385,7 @@ ] }, { - "uuid": "4d60495c-e090-434d-9ce3-3324675c55a9", + "uuid": "741b7ba1-624e-4d05-9a2f-ba8bdc582499", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27310,7 +27402,7 @@ ] }, { - "uuid": "f49d87e6-71ed-484c-b662-b31eb826068c", + "uuid": "8c6e6f67-1b5a-40d4-959b-823abe493aeb", "control-id": "cis_fedora_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -27327,7 +27419,7 @@ ] }, { - "uuid": "fa980459-dd07-41d9-ae21-644243fcb71f", + "uuid": "3881e4fe-7de5-4a41-9e1b-0d648d063749", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27344,7 +27436,7 @@ ] }, { - "uuid": "7cc39f23-98df-45ae-b4d2-1d8179c1ab36", + "uuid": "9bce780b-e94e-4f32-98c8-c6012a26828a", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -27371,7 +27463,7 @@ ] }, { - "uuid": "2b010587-3a71-48a9-b4ff-2acbeaef4cb6", + "uuid": "f2bd6732-db7a-4543-abd2-2fcda0edd845", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27388,7 +27480,7 @@ ] }, { - "uuid": "24bf7210-0eac-4b09-b011-72238f30f973", + "uuid": "19436800-a343-4e1a-8227-d76eb26e2d92", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27405,7 +27497,7 @@ ] }, { - "uuid": "96628253-d691-4ee0-adce-c00bfb530c00", + "uuid": "888587fe-4dc1-4c00-8d34-47247096f1c9", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -27422,7 +27514,7 @@ ] }, { - "uuid": "cf541aa4-c4a4-4c8d-945a-ab618853075e", + "uuid": "5706f674-eb26-47fc-8004-b4243f91a2df", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27439,7 +27531,7 @@ ] }, { - "uuid": "16b7440a-f2ce-4b9a-ae33-59c413654b0a", + "uuid": "1710bce2-4f99-4bd8-8732-318251e99075", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27456,7 +27548,7 @@ ] }, { - "uuid": "8e7f6e75-2b1f-4808-9420-4ee963aa6274", + "uuid": "7750c226-fed6-468e-9690-7fac04c353f1", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27473,7 +27565,7 @@ ] }, { - "uuid": "5e7a9c39-a3b6-40ef-b95d-75bab6d9a8eb", + "uuid": "e023af42-41a2-4f49-81e9-27a485f17208", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27490,7 +27582,7 @@ ] }, { - "uuid": "13c181c5-e824-41e4-afa9-d7c4c1800a3c", + "uuid": "58b70a4a-4306-4763-ad2f-5a6ae0cd31af", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27507,7 +27599,7 @@ ] }, { - "uuid": "444d33c4-80b5-44de-a598-36e660756ddb", + "uuid": "e0fefc0d-406c-49ff-a03a-588939272d89", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27524,7 +27616,7 @@ ] }, { - "uuid": "75616a5b-deb1-461f-80de-5361e21b3692", + "uuid": "80e47155-04cb-46af-86cb-d4a356e00a84", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27541,7 +27633,7 @@ ] }, { - "uuid": "47cc1295-e758-4468-a154-e397f207aa4e", + "uuid": "cf1cbdcc-6af7-4650-aedf-89d29eb0f68a", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27558,7 +27650,7 @@ ] }, { - "uuid": "2ca19612-d2a0-474b-b810-b162448f0e62", + "uuid": "aa62b39a-26df-486c-999c-16b6436efd30", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27575,7 +27667,7 @@ ] }, { - "uuid": "4178db7d-a6a2-41c7-b555-96efe50d01b7", + "uuid": "680a195e-c69f-4028-bb0e-d09487f29671", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27592,7 +27684,7 @@ ] }, { - "uuid": "2fd2c004-4745-4a38-9835-0de4e3a75803", + "uuid": "e36e4fe8-43a2-4d04-ab42-ba7a067b082e", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27609,7 +27701,7 @@ ] }, { - "uuid": "c47b6644-01bf-4ca0-8c0b-b246a2e064d2", + "uuid": "3dfa6aa8-9524-4f0b-9373-b533a6821412", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27626,7 +27718,7 @@ ] }, { - "uuid": "9a6782fe-fdd7-444f-a677-392409867f05", + "uuid": "ff207076-70c1-491c-b577-f28576da231d", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27643,7 +27735,7 @@ ] }, { - "uuid": "47e7706a-e51a-4beb-bb50-7b02a6cd98b1", + "uuid": "7a840b4a-6ca0-407c-aa64-2c0a5fd900df", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27660,7 +27752,7 @@ ] }, { - "uuid": "d70c6f04-da54-4a21-8686-3de61d8d4e99", + "uuid": "53c835fb-95ab-41cd-a3b7-a905d9962350", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27687,7 +27779,7 @@ ] }, { - "uuid": "678d30f6-d9ef-40e2-b241-179e018dd93f", + "uuid": "f812d930-b0c1-4b65-acdb-7198c0dabc39", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27714,7 +27806,7 @@ ] }, { - "uuid": "3217c97a-3920-4f90-b2f7-41cb71cfece6", + "uuid": "f309f952-ef4b-4100-be32-0dc3dedb3845", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27741,7 +27833,7 @@ ] }, { - "uuid": "a9e4565a-a03b-45f6-9fe0-1af23a61804d", + "uuid": "d321d42b-df14-45bc-a5aa-2a88b6b44e09", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27763,7 +27855,7 @@ ] }, { - "uuid": "88f2cd16-6b02-4df9-8e2a-b2402dc38eaa", + "uuid": "e7cbe921-1c94-4b29-afb0-0b7ea97344a4", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -27780,7 +27872,7 @@ ] }, { - "uuid": "538369fa-16f3-45d4-bfa9-3a649a56e7d2", + "uuid": "cf8d9ef1-4be4-4ab1-bdc5-9f10e3a11853", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27812,7 +27904,7 @@ ] }, { - "uuid": "d1a794c1-8fdc-42bb-bccc-af6de225bf49", + "uuid": "4f6c5890-f92e-4f19-9a2b-072c4ac99892", "control-id": "cis_fedora_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -27834,7 +27926,7 @@ ] }, { - "uuid": "6573b0a0-ab49-4fb9-9c81-2009d3f75739", + "uuid": "a9ab1960-e6be-46e7-99db-5ab576b37d2b", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27851,7 +27943,7 @@ ] }, { - "uuid": "e98acf0b-5311-486d-acde-e1bbd577b1e2", + "uuid": "189a75c0-4a4c-4f81-9b66-4f3d871028d9", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -27864,7 +27956,7 @@ ] }, { - "uuid": "a7365bf5-4ede-48bd-a150-c492a9853a29", + "uuid": "24c7de6b-b29f-433b-980d-058ea2b3032a", "control-id": "cis_fedora_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -27881,7 +27973,7 @@ ] }, { - "uuid": "76e304f4-8d8e-472d-bac9-109dd30f4eda", + "uuid": "2f80bb55-bf4c-4c17-bc2b-3685f9dbbaa6", "control-id": "cis_fedora_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -27898,7 +27990,7 @@ ] }, { - "uuid": "78dfed22-e10a-4b7d-8eb3-b4bbba468970", + "uuid": "569eee46-3e73-4a69-a735-73a478f1c656", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27915,7 +28007,7 @@ ] }, { - "uuid": "26a89974-caa5-4a42-aa24-e384b9e16ea7", + "uuid": "28954089-933f-4bd0-8b0c-990592a84358", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27932,7 +28024,7 @@ ] }, { - "uuid": "270dc77e-f666-4efc-b866-238786500ad7", + "uuid": "e5e8816f-6be6-431a-8f54-75adfa7ec76d", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27949,7 +28041,7 @@ ] }, { - "uuid": "98b9b21c-576a-4d55-9c68-87a64c81de8d", + "uuid": "67ae24cf-81ba-4b54-8684-5e488efe5cb8", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27966,7 +28058,7 @@ ] }, { - "uuid": "1c79f373-005e-41f7-aea5-02b148c3fea1", + "uuid": "2a5ad6bf-2726-40b2-9f51-fa923fa043d9", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27988,7 +28080,7 @@ ] }, { - "uuid": "99d679ec-9777-45bb-a63f-9f311b85ad18", + "uuid": "cff72dca-dab9-4efd-a1e5-69694d1bea9e", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -28005,7 +28097,7 @@ ] }, { - "uuid": "d754ea8f-253a-4724-8f0e-cd7658571386", + "uuid": "bb1cfa69-585d-478a-beb9-fab961a9959f", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -28017,7 +28109,7 @@ ] }, { - "uuid": "7157a369-64d3-4524-a041-17efb8fc0700", + "uuid": "80099772-c092-431a-b250-db69cda0c9e1", "control-id": "cis_fedora_2-1.11", "description": "No notes for control-id 2.1.11.", "props": [ @@ -28034,7 +28126,7 @@ ] }, { - "uuid": "f11920b2-4a5b-4c23-b1d7-749dd13ecdf6", + "uuid": "5cfb2382-8bb3-4b51-8b87-c21de4e864e3", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -28051,7 +28143,7 @@ ] }, { - "uuid": "8a87d6d1-f9b7-438d-bbea-35b9fff93084", + "uuid": "9f182b8b-3a5e-4a9f-8bd1-2b9c26b5e728", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -28068,7 +28160,7 @@ ] }, { - "uuid": "a70a948e-71fd-4170-ab84-354c42e21ba2", + "uuid": "e2ef12ce-192d-4732-9561-08d3c6ddf463", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -28085,7 +28177,7 @@ ] }, { - "uuid": "6b45ff26-3a2f-4e59-b670-e1eb71be1753", + "uuid": "3b5b89ff-668a-4e40-8e30-5a096f6b072a", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -28102,7 +28194,7 @@ ] }, { - "uuid": "0ed6693d-747c-4e51-baff-59a4b656d323", + "uuid": "1d2a6be6-ffed-46e2-8c0d-c1c15d9d2075", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -28119,7 +28211,7 @@ ] }, { - "uuid": "66a7f80b-9b65-406a-91e4-e0626d52ff2e", + "uuid": "794e7a1f-7be5-47a1-8f24-7a96d288c464", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -28136,7 +28228,7 @@ ] }, { - "uuid": "87f673a8-1e06-40e4-a5d0-ed79a5cdd7a6", + "uuid": "425c9627-a38f-449d-9f8e-23abed0a6e84", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -28153,7 +28245,7 @@ ] }, { - "uuid": "663c33ee-b881-4031-8e5d-18cc32cb1cbb", + "uuid": "4733a1d9-b096-49e2-994c-a712d60626d6", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -28175,7 +28267,7 @@ ] }, { - "uuid": "7463e96c-cf4c-483f-b88f-a9548b7ba0f2", + "uuid": "9d032928-a9cf-4398-bdf9-6b74e6a5cc9a", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -28188,7 +28280,7 @@ ] }, { - "uuid": "07e5d193-54f4-4017-a82a-f985b812b7de", + "uuid": "5e365ed1-2595-42e1-bbcc-439c06482847", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -28210,7 +28302,7 @@ ] }, { - "uuid": "970fcd39-e2d0-477f-940a-f9c224483c29", + "uuid": "ca8a60c8-2c20-4857-a68c-917441f50b9f", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -28223,7 +28315,7 @@ ] }, { - "uuid": "dad510a1-80c1-473a-96b9-ffb639775a01", + "uuid": "9de39c26-fac3-479d-94a9-bc26afe938e4", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -28240,7 +28332,7 @@ ] }, { - "uuid": "012658ac-d4f3-4435-8c36-ae55208b3804", + "uuid": "6062641d-ea79-45c9-a58c-79ab7cf3d213", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -28252,7 +28344,7 @@ ] }, { - "uuid": "59330666-b835-4297-8551-7e9253a6899a", + "uuid": "968f5516-bf0d-4253-b062-fbfae79d41c4", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -28269,7 +28361,7 @@ ] }, { - "uuid": "6ea310ba-27a2-42a3-a5df-bccda3db147d", + "uuid": "05e6a011-1ec4-4639-a4ef-0759b054f105", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -28286,7 +28378,7 @@ ] }, { - "uuid": "f95abd70-746d-4f62-b8ce-db9adb8718b9", + "uuid": "f5e735e6-6327-4a47-92d9-56672849d764", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -28298,7 +28390,7 @@ ] }, { - "uuid": "54c4e4b0-8126-42b0-a455-71da6a66e38d", + "uuid": "a1b3ec95-34aa-4dc1-be06-9f199890b44e", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -28315,7 +28407,7 @@ ] }, { - "uuid": "e4283fae-25b9-432d-a54e-1a2ac9582237", + "uuid": "bad9f69d-b025-450e-b449-43872c0328a1", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -28332,7 +28424,7 @@ ] }, { - "uuid": "40b65dfb-f017-46a8-a543-f2217b1d041e", + "uuid": "0068905e-8fbc-4af5-b953-98d1ed61340c", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -28354,7 +28446,7 @@ ] }, { - "uuid": "c6c3bb00-13bf-4606-b1c4-ec06ed572b0b", + "uuid": "86a9d7a0-f8e1-4b8f-80e1-5996c7264a80", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28381,7 +28473,7 @@ ] }, { - "uuid": "c96249ce-ec64-4370-89a8-e4981073d0bf", + "uuid": "f7b974a4-21d5-4f03-bea6-5d41aaf473e7", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28408,7 +28500,7 @@ ] }, { - "uuid": "c896fefc-6315-4109-86b3-5d8000497616", + "uuid": "488c6103-0165-440c-8a9c-ce6009b964b8", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28435,7 +28527,7 @@ ] }, { - "uuid": "d49ac398-ca67-4618-93d8-61624d8154c4", + "uuid": "e047c792-95aa-40ac-99a2-d71a64fd34e0", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28462,7 +28554,7 @@ ] }, { - "uuid": "9daf0269-3615-4504-9994-a4140583eb68", + "uuid": "8e29c60a-b95f-46d1-90e1-27da314d6fe7", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28489,7 +28581,7 @@ ] }, { - "uuid": "6d8e24a6-3d96-423e-b59b-72c15291acbe", + "uuid": "79e3c416-827a-4f75-b055-b3c0a1f5e99b", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28516,7 +28608,7 @@ ] }, { - "uuid": "77832a15-3da4-418b-bb3f-5bfcd620ce87", + "uuid": "826adcd6-bc40-4262-bb0e-7cbd95a9349d", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28543,7 +28635,7 @@ ] }, { - "uuid": "19ddabe9-ec87-4c06-86c1-304f42e72f22", + "uuid": "cabc2647-e3e8-46d4-a822-2cc3eae89a22", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28580,7 +28672,7 @@ ] }, { - "uuid": "bb26d1bf-7f93-4a2e-aa65-1bf20198b296", + "uuid": "dede28a8-0479-4dff-84b6-d50e17f67fbb", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28617,7 +28709,7 @@ ] }, { - "uuid": "a56ac085-5c93-4aca-890d-f823d893822e", + "uuid": "324ecffd-360e-4db6-9fb8-536df96dfdc9", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -28630,7 +28722,7 @@ ] }, { - "uuid": "70675eed-6213-401e-8029-966d13672c79", + "uuid": "c0ee39be-978f-4201-a93b-45cb1ce07493", "control-id": "cis_fedora_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -28647,7 +28739,7 @@ ] }, { - "uuid": "423973a8-f256-4471-9f54-2042d6e52d59", + "uuid": "6f359ca7-0367-4540-9f44-f5e1e8af4a99", "control-id": "cis_fedora_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -28664,7 +28756,7 @@ ] }, { - "uuid": "40d151c3-5e93-41a0-b3ed-313b77b3e4db", + "uuid": "7e34a5e2-b18a-47e4-ba03-12a70cbd4c49", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28681,7 +28773,7 @@ ] }, { - "uuid": "02790fbd-fe8b-424e-869a-ad1872559918", + "uuid": "6b238c1a-b595-4a70-8fcb-9589734caaa3", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28698,7 +28790,7 @@ ] }, { - "uuid": "9c08b72c-bfe5-47b3-85c2-6389b49ee272", + "uuid": "859333ab-8509-4dd1-8366-86fb9218210e", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28715,7 +28807,7 @@ ] }, { - "uuid": "48d8d479-ed40-4d19-95a5-1163c33d2adc", + "uuid": "445877ff-c062-417a-b281-eb4e7398b12d", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28732,7 +28824,7 @@ ] }, { - "uuid": "a0c38815-3c25-4cad-827e-b20c94f810ec", + "uuid": "73c2eb6d-cc5d-458a-88d6-a1efb7f2bf0f", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28749,7 +28841,7 @@ ] }, { - "uuid": "3a618f78-6387-4112-b338-9b9f6ffa5c3f", + "uuid": "2cc3dd51-1139-4ae0-9fa6-f907da5f965e", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28766,7 +28858,7 @@ ] }, { - "uuid": "c109cb91-1934-406b-a9b6-b9f357e7f251", + "uuid": "949bcb27-d4b5-4da6-9e5d-7c42747b82fb", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28783,7 +28875,7 @@ ] }, { - "uuid": "371e149c-8d81-4c79-a19d-feb949cf852f", + "uuid": "d2282424-7684-4fe0-8846-dc9f2e98e193", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28800,7 +28892,7 @@ ] }, { - "uuid": "9dd60a08-91be-431d-9811-a5b7f85047e6", + "uuid": "2f7fc42b-eb62-4e72-b0f9-17524665d83c", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28817,7 +28909,7 @@ ] }, { - "uuid": "7f2d7fc3-2837-4b84-a6bf-f4d77c95ca89", + "uuid": "ba849405-0f8d-4d11-9e70-1f2ce1ef9683", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28834,7 +28926,7 @@ ] }, { - "uuid": "03eac8ce-ed2a-4ca8-a456-0bf05c986f0b", + "uuid": "16ef12d9-12ca-45c0-975d-4789b13cbdfa", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28851,7 +28943,7 @@ ] }, { - "uuid": "a0249d10-d9e7-41d9-8c10-fb47fc1cf9d3", + "uuid": "fb9484d4-8c02-4bde-8cd2-bc19c9bfbffd", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28868,7 +28960,7 @@ ] }, { - "uuid": "77a235e6-1195-4ccb-a61f-4cd50e8fd7a9", + "uuid": "51a9ac60-05d0-428c-9688-d05cb67be80c", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28885,7 +28977,7 @@ ] }, { - "uuid": "bbabe282-f3c1-4593-a21b-ace076e8f333", + "uuid": "1347caee-c727-49b7-98f6-daec5140378d", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28902,7 +28994,7 @@ ] }, { - "uuid": "536f73c6-532e-4cad-bd32-6cd4913a382b", + "uuid": "f30baa72-fea6-4c31-8ff5-c91793ef943f", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28919,7 +29011,7 @@ ] }, { - "uuid": "cb35c9e1-578f-4918-a846-4557eb31685f", + "uuid": "1082653f-47e5-450c-9e0e-d4853258f48a", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28936,7 +29028,7 @@ ] }, { - "uuid": "3a003683-788a-40ef-a506-697a5a502009", + "uuid": "60934c52-2843-4b4e-a7ab-1e3770b6110e", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28953,7 +29045,7 @@ ] }, { - "uuid": "ecd939b6-5434-407f-9c47-cf5a05806ef2", + "uuid": "57ce4933-0150-491e-8fa3-5976d23bd0e0", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28970,7 +29062,7 @@ ] }, { - "uuid": "fecab20e-bf6c-46a1-9a04-2326652f4062", + "uuid": "3e635800-bb3d-4ea0-8d6a-f339fad47c0b", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28987,7 +29079,7 @@ ] }, { - "uuid": "70d3c5ab-5d2b-4c1c-a300-8be2a28f5db6", + "uuid": "0eea4dc0-9a50-4d0f-91ad-1d8388956ff2", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -29004,7 +29096,7 @@ ] }, { - "uuid": "7c96c1e9-c5ee-46ac-81fc-7247beb4faee", + "uuid": "2f804982-c2ce-43f7-a5fe-1fe513f40c9e", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -29021,7 +29113,7 @@ ] }, { - "uuid": "d44f779c-67ad-4f24-a861-5f5ef4191c6c", + "uuid": "0ebc743c-43c2-4194-b4aa-fa39181d4148", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -29038,7 +29130,7 @@ ] }, { - "uuid": "72ca5ac9-149c-41eb-a6e2-1a7c6a4d0ca9", + "uuid": "ff077aa4-359d-4b88-9fef-73221e1f0753", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -29055,7 +29147,7 @@ ] }, { - "uuid": "6dfc7fe9-accc-47be-94d5-1115716b8cda", + "uuid": "4784ab91-7b65-4473-be7d-142c4b9cb974", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -29072,7 +29164,7 @@ ] }, { - "uuid": "668d062f-ef4a-4f19-8719-67b718840442", + "uuid": "afc70ed9-969a-4a79-b850-87554fb0b661", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -29089,7 +29181,7 @@ ] }, { - "uuid": "34ea8577-e592-434e-827f-e0e44b31434e", + "uuid": "57715927-863d-41f7-a13c-fb5af45a76e6", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -29106,7 +29198,7 @@ ] }, { - "uuid": "84d8c7ef-e7fb-4e6c-9d62-5712eb866df4", + "uuid": "20c065f0-25e1-4ad3-9fe8-5040cc1d8aa5", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -29123,7 +29215,7 @@ ] }, { - "uuid": "43cf0b9a-8c99-49cc-9e18-0d4b8a72f9ed", + "uuid": "6e4e18b7-a08e-4407-abbf-5aeaa33e0dc6", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -29140,7 +29232,7 @@ ] }, { - "uuid": "7e251704-fb09-46e5-a130-c45687c6dfd2", + "uuid": "5308613a-2d7e-444d-9654-fdb26779a341", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -29157,7 +29249,7 @@ ] }, { - "uuid": "64f38f3e-5b88-49a5-9f81-ae118babb296", + "uuid": "d012e9d6-0371-4e5d-96af-a29ea28d4686", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -29174,7 +29266,7 @@ ] }, { - "uuid": "e069f5ac-67f7-4456-b527-9f97249bb1d8", + "uuid": "2c5b1c0e-bfbb-4fed-90e5-61af81f4864b", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -29191,7 +29283,7 @@ ] }, { - "uuid": "ccb78ce4-690e-4e0e-b6ef-7f8c1674a44a", + "uuid": "e2958e5e-2033-488a-a5dd-a5b45157d630", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -29218,7 +29310,7 @@ ] }, { - "uuid": "a795aeac-6115-4bcb-af85-2c5a1516e6e5", + "uuid": "80cd5edf-2830-47e2-ab42-61d9b4ef723f", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -29231,7 +29323,7 @@ ] }, { - "uuid": "603bf22d-ab4e-418a-82df-81a45969ae18", + "uuid": "066baaf1-a781-4bd8-b61d-ca87af4a0a5a", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -29253,7 +29345,7 @@ ] }, { - "uuid": "a42d6767-08e8-4409-a741-6357b208f35d", + "uuid": "37e1e207-cebc-4a88-abae-418103f74593", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -29265,7 +29357,7 @@ ] }, { - "uuid": "67648652-4fcb-43f5-ae45-19fbdc5d07c2", + "uuid": "983f891d-2e54-403f-b502-6eb6955bf9e2", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -29278,7 +29370,7 @@ ] }, { - "uuid": "1dfc4066-58d1-4f04-bbd2-81e3a2d6fce1", + "uuid": "f70d2b93-c1be-49b5-af63-6fa6ad2aeeb9", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -29290,7 +29382,7 @@ ] }, { - "uuid": "ee80fc9e-3e5d-4d94-8b91-8c99163a455c", + "uuid": "f016c8ae-18a6-4857-8dca-9b813f32ca8a", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -29302,7 +29394,7 @@ ] }, { - "uuid": "ac4c6967-c70f-44b3-8936-28d5a6c2bc18", + "uuid": "ae4ec789-b6ed-4d8c-914a-959e8590a55f", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -29359,7 +29451,7 @@ ] }, { - "uuid": "afd0648f-b8ac-4b1c-8a9a-530d3833facd", + "uuid": "e5b15fce-2c49-48b9-8e2d-e4e1c5745f20", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29386,7 +29478,7 @@ ] }, { - "uuid": "32841233-589d-42ff-b289-9dc6dea2e0ed", + "uuid": "a66f6a88-f0f2-4b0e-97e5-dc110c6333a4", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29413,7 +29505,7 @@ ] }, { - "uuid": "7c0f0cf6-ade6-4081-ae23-1005acf7fca2", + "uuid": "e977d6c5-f5f0-408b-8f1b-be9cbe52642d", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29430,7 +29522,7 @@ ] }, { - "uuid": "29913663-3372-45f2-9b29-bde2914918fb", + "uuid": "bc047d55-9c5b-4e5c-8384-9db1cda7abb6", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29447,7 +29539,7 @@ ] }, { - "uuid": "d1bd8d47-8b05-46ae-ab3c-9a53652d023e", + "uuid": "5506d583-4ae7-48b9-b391-17dbce20169c", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29464,7 +29556,7 @@ ] }, { - "uuid": "cde3e822-74a9-44fa-8ac7-9cf510778b30", + "uuid": "672d9aad-0b5a-484b-9a37-7c080575f10f", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -29481,7 +29573,7 @@ ] }, { - "uuid": "a52fe885-55ea-4dbd-be5f-64acce51fdf0", + "uuid": "f22574d2-260a-452a-a045-d5e62f21cc4f", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -29498,7 +29590,7 @@ ] }, { - "uuid": "e05b9a81-6ef7-48fc-9ecf-1f947b3a3f3f", + "uuid": "4ddc47f3-92b1-4898-8a33-65a94674db0e", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29520,7 +29612,7 @@ ] }, { - "uuid": "87ecfa48-c676-4341-9eca-0380d5a59c93", + "uuid": "7d484eb9-d792-4164-93bd-06b0e0b2e040", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -29537,7 +29629,7 @@ ] }, { - "uuid": "8645dd18-e269-420c-958a-8ba4e229fb9f", + "uuid": "73143093-6642-44d3-b284-88ba65510997", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29554,7 +29646,7 @@ ] }, { - "uuid": "05380966-c0cf-404a-92b1-71006587366b", + "uuid": "0943a585-9ff8-4310-ad7c-72a673408079", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -29571,7 +29663,7 @@ ] }, { - "uuid": "00b78b4f-c515-4a6b-8c36-d010db81cfa8", + "uuid": "3f2ecd82-e552-481c-8aee-d7b508523a4b", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29588,7 +29680,7 @@ ] }, { - "uuid": "d2991dc4-9c65-4525-a04f-1270aee382b8", + "uuid": "e65e792d-5644-4a6c-97c2-0132db2ba45c", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29605,7 +29697,7 @@ ] }, { - "uuid": "d85c5990-9623-499b-a36f-a13e16529084", + "uuid": "2b7f6876-ee0e-42a4-87e2-e112a41f168f", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29622,7 +29714,7 @@ ] }, { - "uuid": "b54a3ba2-36ed-4a65-bbd2-20a4fd050b6e", + "uuid": "95d6d454-7ffd-44ac-8668-0c2ddb9bf657", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29639,7 +29731,7 @@ ] }, { - "uuid": "9c84f690-423b-4233-aea4-58615246a88d", + "uuid": "f83a63d6-a911-47a3-a1e3-81e5057934bc", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29656,7 +29748,7 @@ ] }, { - "uuid": "ed76defc-0b1a-4ba3-aabe-eeaf5b8cd670", + "uuid": "9766811c-603d-4756-b24b-68b8354b8159", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29673,7 +29765,7 @@ ] }, { - "uuid": "2205682b-cea2-4d4e-811f-cad66f401e1a", + "uuid": "c9cd80fe-d949-4ff5-95aa-a26434f827dc", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29690,7 +29782,7 @@ ] }, { - "uuid": "dde55a31-5573-4e93-a2a9-99c301494e2e", + "uuid": "8b9988ab-b1a2-45d8-ad0e-05bc10098e12", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29707,7 +29799,7 @@ ] }, { - "uuid": "a59c2efb-88db-487c-b892-334a851f83d0", + "uuid": "bbf37804-e6ab-46e2-87ae-9b9cc42976f1", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29724,7 +29816,7 @@ ] }, { - "uuid": "4ab938ff-0bd7-4dd6-adba-adccfa00786a", + "uuid": "5d4c2132-d010-4df1-b634-4a6799ced48e", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29741,7 +29833,7 @@ ] }, { - "uuid": "9b5ff3ff-6211-4ae9-a65f-48255e789d61", + "uuid": "d9ccdfa0-748f-4bcf-99ac-ed6184d39369", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29758,7 +29850,7 @@ ] }, { - "uuid": "441bf481-556f-400c-8f24-c55d6deaa20c", + "uuid": "104865c3-3c2f-4ebd-a6c3-804db5bf1fa9", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29775,7 +29867,7 @@ ] }, { - "uuid": "ede04a72-fdad-4ec0-b98e-94102237abe4", + "uuid": "b813917b-9a18-4c2a-8a68-92a29f5dd412", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29792,7 +29884,7 @@ ] }, { - "uuid": "f1fef63b-9cac-4b3a-a6f7-eb1413669e92", + "uuid": "7a84b03c-5cc8-4149-b98d-dcf72e1c9926", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29814,7 +29906,7 @@ ] }, { - "uuid": "f4d17e39-16a9-422d-a4d5-f68de0340ce3", + "uuid": "16b71f39-f920-4953-8def-cf34ea97998f", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -29827,7 +29919,7 @@ ] }, { - "uuid": "895e9128-59ce-4a03-96fe-55c8fd3d7256", + "uuid": "b9077ba5-a185-4801-b9d8-f36a46806083", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -29840,7 +29932,7 @@ ] }, { - "uuid": "c02f0d7c-ceed-4c3c-9e7f-5554dae7a4e9", + "uuid": "ae4a7e0a-52ea-4906-bdf3-e883a8c15572", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -29858,7 +29950,7 @@ ] }, { - "uuid": "d0f1a8b3-42bd-4ebd-9e2e-e1d62bc7ecfd", + "uuid": "d9d4de1e-6051-4175-bdaf-d8f92387c27c", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -29875,7 +29967,7 @@ ] }, { - "uuid": "41b8c15e-fd18-4892-98ba-c90f9628b128", + "uuid": "163987c8-f5b2-48dd-a8bc-a37bf5677e88", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -29897,7 +29989,7 @@ ] }, { - "uuid": "3445ea44-afd3-439f-b7b5-062a3a9990b1", + "uuid": "5ab8da16-d43e-4d8f-b836-2d520d995e99", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -29924,7 +30016,7 @@ ] }, { - "uuid": "b77ecca1-dfed-49b9-aefe-3b7fe21e1330", + "uuid": "14f7447e-cabd-4c9f-bbe7-eb8eb8af9e16", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -29936,7 +30028,7 @@ ] }, { - "uuid": "a9c1aa33-d871-4a5d-a0c0-a05e059a7b38", + "uuid": "c7b18586-c22b-42da-9f56-784f0e8e84fd", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -29953,7 +30045,7 @@ ] }, { - "uuid": "53a0ef60-7ec4-4473-b13c-2425109f492f", + "uuid": "b7496285-2cc0-401a-a092-68ef72ae10f5", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -29970,7 +30062,7 @@ ] }, { - "uuid": "32cc502e-4271-45b8-a4c3-83a33431e803", + "uuid": "f106a849-bb62-4b22-adc7-d2aa057cdfb4", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29987,7 +30079,7 @@ ] }, { - "uuid": "8d795ff2-231e-43db-aa24-3af8452f756d", + "uuid": "97abeb21-2e18-4820-aebd-a48286e01b1e", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -30004,7 +30096,7 @@ ] }, { - "uuid": "d872e38d-bcbf-4923-a24e-729acbca5024", + "uuid": "9db38c85-c975-46b6-ad1d-0476a997704b", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -30021,7 +30113,7 @@ ] }, { - "uuid": "b18ddcc6-7433-4c61-8894-d66eddc830c4", + "uuid": "ce1354c7-8066-420c-b0b0-4625f2e64d5d", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -30038,7 +30130,7 @@ ] }, { - "uuid": "30820892-daee-43bb-b324-2743c49511f0", + "uuid": "425545a6-e483-4157-a185-cb914f226884", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -30055,7 +30147,7 @@ ] }, { - "uuid": "b35df534-75c0-438f-b54c-6278e705c51b", + "uuid": "c7627a74-fc5f-4ab2-89a9-ca2453454c34", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -30072,7 +30164,7 @@ ] }, { - "uuid": "b6803a81-dabf-41fe-8966-d538b1fb2988", + "uuid": "31e31771-9407-49fb-baf7-3d59194d43b8", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -30089,7 +30181,7 @@ ] }, { - "uuid": "81ef142f-43be-4ae6-8ff9-feac4ce4c30c", + "uuid": "70c657a1-3a87-439a-a280-bec16c006e81", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -30106,7 +30198,7 @@ ] }, { - "uuid": "8afaaec3-b0c1-4873-bc78-4b48fc92606a", + "uuid": "97709de8-cd6d-45ed-b4ef-2bf3ec64e00d", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -30128,7 +30220,7 @@ ] }, { - "uuid": "2a196cae-c7d2-49d1-a261-650ab29165cb", + "uuid": "ba69f1bd-89d7-47da-b307-9bac0e7d23da", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -30141,7 +30233,7 @@ ] }, { - "uuid": "b55cce40-89b4-4b1c-a848-240f2071fd3a", + "uuid": "fa0aa298-8117-4474-b8e3-d127eb38333b", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -30158,7 +30250,7 @@ ] }, { - "uuid": "97ee95f0-03bf-46aa-a6d7-65676f3b83bf", + "uuid": "50f81642-3bb0-444e-9b0c-03502e5c6615", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -30175,7 +30267,7 @@ ] }, { - "uuid": "5503488d-d471-4272-811f-eddb685a756b", + "uuid": "2c56b64b-f8b8-42eb-8d3c-2b8d5e1e7c80", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -30192,7 +30284,7 @@ ] }, { - "uuid": "fc26c7d3-541f-481b-8317-3351fcc6b981", + "uuid": "14d2d01a-131e-42fc-a7fa-0a2cf227ab2d", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -30214,7 +30306,7 @@ ] }, { - "uuid": "f7bf9ecf-f2c9-47ae-81b7-2d4d8cf6eead", + "uuid": "c371bfec-32c3-4258-a15a-1b0ffcd0e4b4", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -30231,7 +30323,7 @@ ] }, { - "uuid": "d60aa5b2-ff03-4c2a-8bb5-a379fb3f8323", + "uuid": "a58242d2-8678-4f7a-87cd-c9cb9b28e0ea", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -30253,7 +30345,7 @@ ] }, { - "uuid": "755eb998-04b7-40c3-afd4-d9427c93cbb1", + "uuid": "1ed3e501-648d-4990-aa02-bb742b8b726a", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -30275,7 +30367,7 @@ ] }, { - "uuid": "7d22bec5-b443-415f-9053-b084c7fdcacf", + "uuid": "17b0b4a9-f20b-4d7c-949d-ebe93e238e4d", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -30292,7 +30384,7 @@ ] }, { - "uuid": "c7429b1c-e875-4555-9190-5372899e0b1c", + "uuid": "b3b8cdc9-da29-460e-b904-85fd1b394c04", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -30314,7 +30406,7 @@ ] }, { - "uuid": "94055ba5-326c-4541-8d19-d7da7f51e3e9", + "uuid": "b9edf77a-d888-442c-bf6e-efcbca3fd5e4", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -30331,7 +30423,7 @@ ] }, { - "uuid": "eba2099d-8df2-4f3f-ab9b-5be73bf9faa0", + "uuid": "9f5f592d-c079-43ce-bcbd-56743ee0d500", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -30348,7 +30440,7 @@ ] }, { - "uuid": "43115dd3-a760-43f3-957d-2fe7a6389d0c", + "uuid": "5d2bafce-fb7b-4313-9146-6ab3494cfa00", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30365,7 +30457,7 @@ ] }, { - "uuid": "e75ad028-afb3-4f76-84cd-976ee020a64a", + "uuid": "3e00aea8-0257-4cac-92aa-0986666cda68", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30382,7 +30474,7 @@ ] }, { - "uuid": "18693f5e-efe7-4df0-a55a-b6eb3875c044", + "uuid": "4dcc2791-4d10-4394-b44f-d302b1d806ef", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30399,7 +30491,7 @@ ] }, { - "uuid": "07a04ede-9d6d-496c-8f89-62e32055b096", + "uuid": "522804af-81d9-456d-84d9-667ebaa0a271", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30421,7 +30513,7 @@ ] }, { - "uuid": "ce5f4700-11db-4ab8-a696-e67746d5bc40", + "uuid": "f907a6b7-0ae0-4281-a012-6218ad93a7f3", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30438,7 +30530,7 @@ ] }, { - "uuid": "bdbdce70-c5c0-4e36-863b-062dd494eb21", + "uuid": "5e4b2d35-c044-4c8e-863a-e874bad83a3f", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30460,7 +30552,7 @@ ] }, { - "uuid": "50d8c859-6983-413e-bc8e-4f7bdb0bfb8e", + "uuid": "574ebad4-d789-4eda-817e-922e9054dbbd", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30477,7 +30569,7 @@ ] }, { - "uuid": "a1761681-a1c2-47a5-b886-48df150ccfd3", + "uuid": "cb60ec2c-a517-45e9-bbaa-c9a680641e63", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30494,7 +30586,7 @@ ] }, { - "uuid": "dc12a4ce-64e1-4fa5-930d-a8a0ea393a48", + "uuid": "d74b52eb-032b-4ae7-a410-2e2464f7409f", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30521,7 +30613,7 @@ ] }, { - "uuid": "7ffbec9d-d4fc-4190-b910-60a07c2ef9ce", + "uuid": "e71c16c3-e090-4506-be29-212757db9026", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30543,7 +30635,7 @@ ] }, { - "uuid": "8326aca9-f20b-410c-a3a5-7e9fe55ba979", + "uuid": "94872268-04c6-4b31-8222-15df1294328e", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30560,7 +30652,7 @@ ] }, { - "uuid": "09de82c3-7737-4e67-9390-36d45f39fcc9", + "uuid": "80fe25e2-7377-4273-8c5a-a18d16b0fa27", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30577,7 +30669,7 @@ ] }, { - "uuid": "3e7ca4a0-8a1f-4485-9eab-5b284c4fa505", + "uuid": "cc56430b-68c7-4e81-8ae5-6c04790dc34f", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30594,7 +30686,7 @@ ] }, { - "uuid": "5e857b42-326e-4fd2-9b35-75d286f4ddca", + "uuid": "e044c517-7a2b-4dcd-94e4-ff9336173677", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -30607,7 +30699,7 @@ ] }, { - "uuid": "27ba8422-8f92-41aa-9201-3abad99b602c", + "uuid": "8c4b015b-7ec3-45de-8ba5-038fe615aae4", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -30620,7 +30712,7 @@ ] }, { - "uuid": "455e7f7b-5eae-4c89-8498-116c4b37c65c", + "uuid": "3744e30a-cce7-46f7-8a4c-57f7429ef66b", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30637,7 +30729,7 @@ ] }, { - "uuid": "6e761521-0a64-46f8-8eda-51e1ab525159", + "uuid": "704d0da3-7cb7-4de8-bd3a-451c045006f3", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30654,7 +30746,7 @@ ] }, { - "uuid": "47749620-f88c-4219-90a8-79a028b31d50", + "uuid": "3c78816e-f19b-45b2-9ae7-a1fa055d27aa", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -30667,7 +30759,7 @@ ] }, { - "uuid": "811fb2f7-8bc3-46b5-9f9c-5fa468235608", + "uuid": "ad9e2f7e-4a0e-42ba-ada2-6459d7a8c6e1", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30684,7 +30776,7 @@ ] }, { - "uuid": "7cfc776c-1cfd-4b1c-a614-deeb2be38b06", + "uuid": "2fceaf8f-3e83-4249-ba70-4768b59cf784", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30701,7 +30793,7 @@ ] }, { - "uuid": "b898c51d-9334-4dfc-8feb-f0ce7b5c086c", + "uuid": "2d2540bc-9707-49b0-a7c9-f4ee2d06e232", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30718,7 +30810,7 @@ ] }, { - "uuid": "412b09f0-dfbf-43c6-bbf0-e0ddd1d1bdda", + "uuid": "eec6c78f-b5c1-44c1-bf1f-b26fc289eef0", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30735,7 +30827,7 @@ ] }, { - "uuid": "8ebf9e01-92d7-4246-96a0-5614b7acff4a", + "uuid": "1248fb28-ef57-4ed3-b90f-40d53f067ee8", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30752,7 +30844,7 @@ ] }, { - "uuid": "c2aa4ee7-9a01-4761-a7ad-bd341d55ebd1", + "uuid": "61e2396c-ee22-4be1-bcb5-b1ab965a92b4", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -30764,7 +30856,7 @@ ] }, { - "uuid": "885faeec-5b92-488c-a799-5853ea9c4c33", + "uuid": "24974af8-44be-41f4-ae3c-5f4e9e0bdb05", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -30776,7 +30868,7 @@ ] }, { - "uuid": "36adf62c-0686-4bf3-8d24-bcfc8c15cfc9", + "uuid": "cfb7ec9d-8a5c-41c2-b6ef-95da33e40897", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -30788,7 +30880,7 @@ ] }, { - "uuid": "ceece9f4-f06a-43c4-9fcd-d3bc68db0c96", + "uuid": "586ccf8d-3f49-425f-892e-59c43e93bc97", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -30800,7 +30892,7 @@ ] }, { - "uuid": "257fa4f7-1521-476c-bc7d-f75c58b88731", + "uuid": "723da072-340a-4f1a-90f0-86249045e88f", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -30813,7 +30905,7 @@ ] }, { - "uuid": "32ac68e2-b436-4294-b329-de3756cc563b", + "uuid": "6252d8fd-6857-43a6-a810-bf7c0a3a4fa7", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -30826,7 +30918,7 @@ ] }, { - "uuid": "646888a9-1180-4349-855c-5c3dc7d1dae9", + "uuid": "7b247abd-8470-4a42-a1fc-93222b81f689", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -30838,7 +30930,7 @@ ] }, { - "uuid": "8121f9f2-ebb0-453c-8230-57cd2d466931", + "uuid": "223068c0-f540-4533-b854-7cb043865423", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -30851,7 +30943,7 @@ ] }, { - "uuid": "9045d593-0fe8-4e9f-8a2e-a5af7301beec", + "uuid": "6ed2ea7f-cdb8-482d-aec3-ac5a846c51e4", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30878,7 +30970,7 @@ ] }, { - "uuid": "a3351977-e4ea-4ab3-9353-7281efca061b", + "uuid": "a77eb425-90be-444a-ab5a-e49db889aef4", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30905,7 +30997,7 @@ ] }, { - "uuid": "b91e3c31-dcb1-4804-94a4-e010cc5dd59d", + "uuid": "223241e8-5f5f-46ec-bb4b-7a9b689ee162", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30932,7 +31024,7 @@ ] }, { - "uuid": "aeea9a1e-c7e4-40fa-a9b7-0c9b372ce301", + "uuid": "d1a2f65d-5931-418f-a13e-5f32e4f950d6", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30959,7 +31051,7 @@ ] }, { - "uuid": "cc969c67-df82-4721-9cef-fe1d51854407", + "uuid": "c7bfe738-85b8-43c0-9a61-2b64e62a7b03", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30986,7 +31078,7 @@ ] }, { - "uuid": "998f1ad5-b8d6-421c-8ea4-f367acba0112", + "uuid": "7b48bc1f-674f-4fd2-a801-4fd58ad5a59e", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -31013,7 +31105,7 @@ ] }, { - "uuid": "dc5b21ed-fca8-4337-967f-24980f408e77", + "uuid": "e7e8e766-7f0a-4ee0-8d50-8fc76a789841", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -31040,7 +31132,7 @@ ] }, { - "uuid": "d390f536-72f1-4108-ac10-687ec7f6e640", + "uuid": "81da46a1-756a-41ce-a8bc-a7307bcbc808", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -31067,7 +31159,7 @@ ] }, { - "uuid": "7bf48d7b-b625-48d3-b6f5-64c49140303d", + "uuid": "99f2fb73-6158-4a1a-9ca9-039c427238e8", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -31094,7 +31186,7 @@ ] }, { - "uuid": "3ab2d9a9-5502-4a8d-a1fd-38fd095ec52a", + "uuid": "5b392357-c058-44c6-bd80-aa7e26326790", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -31121,7 +31213,7 @@ ] }, { - "uuid": "771c4e98-4171-4777-a827-478cdaeffed4", + "uuid": "91883f83-c57d-4619-b518-985a46f71ccf", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -31163,7 +31255,7 @@ ] }, { - "uuid": "f695d062-e5d6-4572-add0-698d5c47fdf3", + "uuid": "e254baaf-3e06-40ad-bfb8-8fbfbd2731e7", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -31185,7 +31277,7 @@ ] }, { - "uuid": "d8e18489-3916-42d5-825d-e21172c758a4", + "uuid": "71d39fe9-78cd-460f-9ae3-b9ba4039a797", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -31207,7 +31299,7 @@ ] }, { - "uuid": "6c029c64-0b35-42b8-96aa-0b933dc56b73", + "uuid": "577b43a7-608d-4ec2-9751-76d16769543c", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -31220,7 +31312,7 @@ ] }, { - "uuid": "9e5dcdba-f3ad-4d6e-b919-08fed5e07bf2", + "uuid": "27699a8e-4175-4550-8e39-220f2b74ce67", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -31237,7 +31329,7 @@ ] }, { - "uuid": "4f5b7096-4d66-415a-ba85-1958233fca01", + "uuid": "3ce2d34c-9f5e-4d88-a8c4-fc0c1f4d5b0e", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -31254,7 +31346,7 @@ ] }, { - "uuid": "ecb29bf7-28fe-40e9-9324-94fd4587a4fc", + "uuid": "38c2b3d5-40a3-44d2-8747-a9481e9529b6", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -31271,7 +31363,7 @@ ] }, { - "uuid": "b241a95a-eb6c-4ced-8e53-0646bc3d718c", + "uuid": "cf7cf3d3-6112-4c86-b0eb-d1e5881faee1", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -31288,7 +31380,7 @@ ] }, { - "uuid": "42916b01-3bbd-4520-a239-f75172459013", + "uuid": "209ec5c5-a13c-4a72-a16b-dc74a6033be4", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -31305,7 +31397,7 @@ ] }, { - "uuid": "519086e8-8fbf-4668-91db-f1ae82940bf9", + "uuid": "791f1dd5-7f6c-4ee9-973a-20d3bb33d7f6", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -31322,7 +31414,7 @@ ] }, { - "uuid": "ee220c25-383a-4d6f-8ac7-527c7588d3b7", + "uuid": "306a1e9d-1e15-4784-b46f-2fffa70da071", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -31339,7 +31431,7 @@ ] }, { - "uuid": "7e58dcc1-359a-46bf-b2a8-b3cf16ebf041", + "uuid": "44daf50c-c976-4d0a-af6b-2d9cf060c475", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31366,7 +31458,7 @@ ] }, { - "uuid": "87a52ea6-9762-41de-811b-da12d36d20ae", + "uuid": "5e73e4e7-ea2d-4a12-8d03-1fa2f8955fc2", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json index b73dc98ec..fe1dea5df 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "5c3c7cf2-7b25-40ff-b6fe-74a80316f83a", "metadata": { "title": "Component definition for fedora", - "last-modified": "2026-02-12T10:39:01.858223+00:00", - "version": "2.0", + "last-modified": "2026-03-27T01:44:40.273548+00:00", + "version": "2.1", "oscal-version": "1.1.3" }, "components": [ @@ -47,103 +47,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -155,67 +155,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -227,13 +227,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -245,13 +245,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -263,31 +263,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -299,49 +299,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -353,13 +353,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -371,31 +371,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -407,13 +407,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -425,13 +425,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -443,13 +443,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -461,13 +461,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -479,13 +479,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -497,13 +497,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -515,427 +515,427 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_minimum_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum age of password in days", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_minimum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Minimum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_dir", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The directory where the user files with the failure records are kept", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_dir", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "The directory where the user files with the failure records are kept", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_audit_backlog_limit", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 8192, 8192: 8192}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_admin_space_left_action", + "value": "var_audit_backlog_limit", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", + "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", + "value": "{'default': 8192, 8192: 8192}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_error_action", + "value": "var_auditd_admin_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", + "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_full_action", + "value": "var_auditd_disk_error_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file", + "value": "var_auditd_disk_full_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file in /etc/audit/auditd.conf", + "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file_action", + "value": "var_auditd_max_log_file", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", + "value": "The setting for max_log_file in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", + "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_space_left_action", + "value": "var_auditd_max_log_file_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for space_left_action in /etc/audit/auditd.conf", + "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", + "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_auditd_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "The setting for space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -947,252 +947,270 @@ { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_postfix_inet_interfaces", + "value": "var_password_pam_remember_control_flag", "remarks": "rule_set_000" }, { "name": "Parameter_Description_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for inet_interfaces in /etc/postfix/main.cf", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_55", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", + "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_screensaver_lock_delay", + "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { "name": "Parameter_Description_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", + "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", + "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_policy_name", + "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { "name": "Parameter_Description_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", + "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", + "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_selinux_state", + "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { "name": "Parameter_Description_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", + "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'enforcing', 'disabled': 'disabled', 'enforcing': 'enforcing', 'permissive': 'permissive'}", + "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_max_sessions", + "value": "var_selinux_state", "remarks": "rule_set_000" }, { "name": "Parameter_Description_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of open sessions permitted.", + "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", + "value": "{'default': 'enforcing', 'disabled': 'disabled', 'enforcing': 'enforcing', 'permissive': 'permissive'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_keepalive", + "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Description_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of idle message counts before session is terminated.", + "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", + "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_login_grace_time", + "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { "name": "Parameter_Description_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", + "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 60, 60: 60}", + "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sshd_set_maxstartups", + "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", + "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", + "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_sudo_timestamp_timeout", + "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { "name": "Parameter_Description_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", + "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_user_initialization_files_regex", + "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_65", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_user_initialization_files_regex", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_65", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_65", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" }, @@ -1511,1663 +1529,1663 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_mcstrans_removed", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "banner_etc_issue_cis", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_owner_etc_motd", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_permissions_etc_motd", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_owner_etc_issue", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "file_permissions_etc_issue", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_kea_removed", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall kea Package", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_bind_removed", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall bind Package", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "package_dnsmasq_removed", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "service_nfs_disabled", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_rsync_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall rsync Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_samba_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall Samba Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_net-snmp_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "package_squid_removed", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Uninstall squid Package", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_httpd_removed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_nginx_removed", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Uninstall nginx Package", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_ftp_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Remove ftp Package", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet_removed", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Remove telnet Clients", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "package_tftp_removed", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Remove tftp Daemon", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "package_cron_installed", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "service_crond_enabled", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Enable cron Service", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_groupowner_crontab", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_owner_crontab", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Owner on crontab", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_permissions_crontab", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Permissions on crontab", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_owner_cron_hourly", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", + "value": "file_owner_cron_daily", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.weekly", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_weekly", + "value": "file_owner_cron_weekly", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.weekly", + "value": "Verify Owner on cron.weekly", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_monthly", + "value": "file_permissions_cron_weekly", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.monthly", + "value": "Verify Permissions on cron.weekly", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_monthly", + "value": "file_groupowner_cron_monthly", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.monthly", + "value": "Verify Group Who Owns cron.monthly", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_monthly", + "value": "file_owner_cron_monthly", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.monthly", + "value": "Verify Owner on cron.monthly", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_yearly", + "value": "file_permissions_cron_monthly", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.yearly", + "value": "Verify Permissions on cron.monthly", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_yearly", + "value": "file_groupowner_cron_yearly", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.yearly", + "value": "Verify Group Who Owns cron.yearly", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_yearly", + "value": "file_owner_cron_yearly", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.yearly", + "value": "Verify Owner on cron.yearly", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_d", + "value": "file_permissions_cron_yearly", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.d", + "value": "Verify Permissions on cron.yearly", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_d", + "value": "file_groupowner_cron_d", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.d", + "value": "Verify Group Who Owns cron.d", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_d", + "value": "file_owner_cron_d", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.d", + "value": "Verify Owner on cron.d", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_deny_not_exist", + "value": "file_permissions_cron_d", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.deny does not exist", + "value": "Verify Permissions on cron.d", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_allow_exists", + "value": "file_cron_deny_not_exist", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.allow exists", + "value": "Ensure that /etc/cron.deny does not exist", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_allow", + "value": "file_cron_allow_exists", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/cron.allow file", + "value": "Ensure that /etc/cron.allow exists", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_allow", + "value": "file_groupowner_cron_allow", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/cron.allow file", + "value": "Verify Group Who Owns /etc/cron.allow file", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_allow", + "value": "file_owner_cron_allow", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/cron.allow file", + "value": "Verify User Who Owns /etc/cron.allow file", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_deny_not_exist", + "value": "file_permissions_cron_allow", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.deny does not exist", + "value": "Verify Permissions on /etc/cron.allow file", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_allow_exists", + "value": "file_at_deny_not_exist", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.allow exists", + "value": "Ensure that /etc/at.deny does not exist", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_at_allow", + "value": "file_at_allow_exists", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/at.allow file", + "value": "Ensure that /etc/at.allow exists", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_at_allow", + "value": "file_groupowner_at_allow", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/at.allow file", + "value": "Verify Group Who Owns /etc/at.allow file", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_at_allow", + "value": "file_owner_at_allow", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/at.allow file", + "value": "Verify User Who Owns /etc/at.allow file", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_atm_disabled", + "value": "file_permissions_at_allow", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ATM Support", + "value": "Verify Permissions on /etc/at.allow file", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_can_disabled", + "value": "kernel_module_atm_disabled", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable CAN Support", + "value": "Disable ATM Support", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_dccp_disabled", + "value": "kernel_module_can_disabled", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable DCCP Support", + "value": "Disable CAN Support", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_tipc_disabled", + "value": "kernel_module_dccp_disabled", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable TIPC Support", + "value": "Disable DCCP Support", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_rds_disabled", + "value": "kernel_module_tipc_disabled", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable RDS Support", + "value": "Disable TIPC Support", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_forward", + "value": "kernel_module_rds_disabled", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", + "value": "Disable RDS Support", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_forwarding", + "value": "sysctl_net_ipv4_ip_forward", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding", + "value": "sysctl_net_ipv4_conf_all_forwarding", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", + "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_conf_default_forwarding", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians", + "value": "sysctl_net_ipv4_conf_all_log_martians", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies", + "value": "sysctl_net_ipv4_conf_default_log_martians", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", + "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding", + "value": "sysctl_net_ipv4_tcp_syncookies", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv6 Forwarding", + "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding", + "value": "sysctl_net_ipv6_conf_all_forwarding", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv6 Forwarding by default", + "value": "Disable Kernel Parameter for IPv6 Forwarding", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects", + "value": "sysctl_net_ipv6_conf_default_forwarding", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", + "value": "Disable Kernel Parameter for IPv6 Forwarding by default", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects", + "value": "sysctl_net_ipv6_conf_all_accept_redirects", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route", + "value": "sysctl_net_ipv6_conf_default_accept_redirects", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route", + "value": "sysctl_net_ipv6_conf_all_accept_source_route", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra", + "value": "sysctl_net_ipv6_conf_default_accept_source_route", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra", + "value": "sysctl_net_ipv6_conf_all_accept_ra", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", + "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nftables_installed", + "value": "sysctl_net_ipv6_conf_default_accept_ra", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install nftables Package", + "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_firewalld_enabled", + "value": "package_nftables_installed", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify firewalld Enabled", + "value": "Install nftables Package", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_firewalld_installed", + "value": "service_firewalld_enabled", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install firewalld Package", + "value": "Verify firewalld Enabled", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nftables_disabled", + "value": "package_firewalld_installed", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify nftables Service is Disabled", + "value": "Install firewalld Package", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "firewalld_loopback_traffic_trusted", + "value": "service_nftables_disabled", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Firewalld to Trust Loopback Traffic", + "value": "Verify nftables Service is Disabled", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "firewalld_loopback_traffic_restricted", + "value": "firewalld_loopback_traffic_trusted", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Firewalld to Restrict Loopback Traffic", + "value": "Configure Firewalld to Trust Loopback Traffic", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_sshd_config", + "value": "firewalld_loopback_traffic_restricted", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server config file", + "value": "Configure Firewalld to Restrict Loopback Traffic", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_sshd_config", + "value": "file_groupowner_sshd_config", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server config file", + "value": "Verify Group Who Owns SSH Server config file", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_config", + "value": "file_owner_sshd_config", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server config file", + "value": "Verify Owner on SSH Server config file", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_sshd_config_d", + "value": "file_permissions_sshd_config", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Config File", + "value": "Verify Permissions on SSH Server config file", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_drop_in_config", + "value": "directory_permissions_sshd_config_d", "remarks": "rule_set_165" }, { @@ -3179,3199 +3197,3211 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_sshd_config_d", + "value": "file_permissions_sshd_drop_in_config", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server Configuration Files", + "value": "Verify Permissions on SSH Server Config File", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_sshd_config_d", + "value": "directory_groupowner_sshd_config_d", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server Configuration Files", + "value": "Verify Group Who Owns SSH Server Configuration Files", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_sshd_drop_in_config", + "value": "directory_owner_sshd_config_d", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server Configuration Files", + "value": "Verify Owner on SSH Server Configuration Files", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_sshd_drop_in_config", + "value": "file_groupowner_sshd_drop_in_config", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server Configuration Files", + "value": "Verify Group Who Owns SSH Server Configuration Files", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "file_owner_sshd_drop_in_config", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Verify Owner on SSH Server Configuration Files", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_private_key", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Private *_key Key Files", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_private_key", + "value": "file_ownership_sshd_private_key", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Private *_key Key Files", + "value": "Verify Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_pub_key", + "value": "file_groupownership_sshd_private_key", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Public *.pub Key Files", + "value": "Verify Group Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_pub_key", + "value": "file_permissions_sshd_pub_key", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Public *.pub Key Files", + "value": "Verify Permissions on SSH Server Public *.pub Key Files", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_pub_key", + "value": "file_ownership_sshd_pub_key", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", + "value": "Verify Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_limit_user_access", + "value": "file_groupownership_sshd_pub_key", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Users' SSH Access", + "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner_net", + "value": "sshd_limit_user_access", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Limit Users' SSH Access", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "sshd_enable_warning_banner_net", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_forwarding", + "value": "sshd_set_keepalive", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Forwarding", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_gssapi_auth", + "value": "sshd_disable_forwarding", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GSSAPI Authentication", + "value": "Disable SSH Forwarding", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "sshd_disable_gssapi_auth", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable GSSAPI Authentication", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts", + "value": "disable_host_auth", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for .rhosts Files", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_login_grace_time", + "value": "sshd_disable_rhosts", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SSH LoginGraceTime is configured", + "value": "Disable SSH Support for .rhosts Files", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_loglevel_verbose", + "value": "sshd_set_login_grace_time", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Daemon LogLevel to VERBOSE", + "value": "Ensure SSH LoginGraceTime is configured", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_auth_tries", + "value": "sshd_set_loglevel_verbose", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH authentication attempt limit", + "value": "Set SSH Daemon LogLevel to VERBOSE", "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_maxstartups", + "value": "sshd_set_max_auth_tries", "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SSH MaxStartups is configured", + "value": "Set SSH authentication attempt limit", "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_sessions", + "value": "sshd_set_maxstartups", "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH MaxSessions limit", + "value": "Ensure SSH MaxStartups is configured", "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_set_max_sessions", "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Set SSH MaxSessions limit", "remarks": "rule_set_189" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "sshd_disable_empty_passwords", + "remarks": "rule_set_190" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Disable SSH Access via Empty Passwords", + "remarks": "rule_set_190" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_var_lib_selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in /var/lib/selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_create", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - create_module", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_431" + "remarks": "rule_set_432" } ], "control-implementations": [ { - "uuid": "5ca0f07a-df46-425c-b82f-b118d7382629", + "uuid": "fef3463a-158b-4704-9408-103c41bd37fa", "source": "trestle://profiles/fedora-cis_fedora-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -6389,17 +6419,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -6775,7 +6811,7 @@ ], "implemented-requirements": [ { - "uuid": "6f9d89e1-12b1-41fd-9984-c7bbd06abc3f", + "uuid": "6222a9db-a01f-4129-ae3d-2430685599ff", "control-id": "cis_fedora_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6792,7 +6828,7 @@ ] }, { - "uuid": "8331282c-250a-4dfd-a7bd-e1d98290857e", + "uuid": "ab3536ea-fa54-4d17-834a-669cfb0532b8", "control-id": "cis_fedora_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6809,7 +6845,7 @@ ] }, { - "uuid": "72a4fdb4-1a07-4576-b042-9bbd7353a4dc", + "uuid": "3225686b-63ff-459e-b893-f9e512a48c72", "control-id": "cis_fedora_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6826,7 +6862,7 @@ ] }, { - "uuid": "728d3f70-207d-4a2d-b799-423721ab5926", + "uuid": "275cd11d-e373-47dc-8fc0-5f00d1f9a172", "control-id": "cis_fedora_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -6843,7 +6879,7 @@ ] }, { - "uuid": "b73e2bc2-f874-462c-9ef9-07a02153f152", + "uuid": "da5b34a1-a9d5-4453-8080-b2804bd91adc", "control-id": "cis_fedora_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -6860,7 +6896,7 @@ ] }, { - "uuid": "baee6a56-9cf2-4987-bc74-afa587560a27", + "uuid": "a5dfd86d-3e39-4ce5-894b-d8c56acc4fda", "control-id": "cis_fedora_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6877,7 +6913,7 @@ ] }, { - "uuid": "174281be-3cad-4855-968f-11f1ea84faba", + "uuid": "9607371e-c844-45d3-9869-6fddb78fc199", "control-id": "cis_fedora_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6894,7 +6930,7 @@ ] }, { - "uuid": "bef4b6af-bc7e-4ff1-9950-0cac384a91e3", + "uuid": "fe6d118e-7809-43c5-8300-108e36c18311", "control-id": "cis_fedora_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6911,7 +6947,7 @@ ] }, { - "uuid": "38b935e1-06ce-4563-a450-ba1dbe435c9a", + "uuid": "faec1481-3508-41cf-b671-f6d74219de34", "control-id": "cis_fedora_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6928,7 +6964,7 @@ ] }, { - "uuid": "b628830d-8328-4935-850c-eec78f468ec2", + "uuid": "b2af9ca0-d5dc-47f6-aa84-c77f16d72619", "control-id": "cis_fedora_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -6945,7 +6981,7 @@ ] }, { - "uuid": "001f60c8-7de5-495a-978f-76334ff26039", + "uuid": "d49947b5-517a-4185-b7fd-8ed84bffaff4", "control-id": "cis_fedora_1-2.1.3", "description": "The description for control-id cis_fedora_1-2.1.3.", "props": [ @@ -6958,7 +6994,7 @@ ] }, { - "uuid": "8c6a98e9-0d71-4d20-9ec2-8960ab625805", + "uuid": "417f4f53-c153-4633-9f39-4fae65d262b9", "control-id": "cis_fedora_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -6975,7 +7011,7 @@ ] }, { - "uuid": "6bda18a6-f1d6-49ef-a220-930b3c227041", + "uuid": "717ca703-1ae7-45b6-bde6-99f07bd134a4", "control-id": "cis_fedora_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -6992,7 +7028,7 @@ ] }, { - "uuid": "470ca977-2114-4833-9228-c8e0bd976d41", + "uuid": "5ecbaeb3-e8a7-4f61-8471-d6063b3f273e", "control-id": "cis_fedora_1-3.1.6", "description": "The description for control-id cis_fedora_1-3.1.6.", "props": [ @@ -7005,7 +7041,7 @@ ] }, { - "uuid": "329764c6-65e0-41d5-a279-bcf647fe1f4e", + "uuid": "a8dc3815-865d-4882-a509-c91d4bf97861", "control-id": "cis_fedora_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -7027,7 +7063,7 @@ ] }, { - "uuid": "9b965752-fc85-45f4-85ab-9227569ce74a", + "uuid": "5618ee39-d690-4f0d-9409-55feb2e57b5a", "control-id": "cis_fedora_1-8.7", "description": "No notes for control-id 1.8.7.", "props": [ @@ -7044,7 +7080,7 @@ ] }, { - "uuid": "0c210448-a9ac-491d-98f8-7faf1376674b", + "uuid": "7085418c-843f-4994-9298-b2547c6d55a6", "control-id": "cis_fedora_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -7061,7 +7097,7 @@ ] }, { - "uuid": "abfc5310-300f-408d-9341-da5f3c39ca8c", + "uuid": "d6bfc4c5-2544-4b20-abb9-773d6e025269", "control-id": "cis_fedora_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -7078,7 +7114,7 @@ ] }, { - "uuid": "e5f7439a-8b3b-4eaf-9588-7f0f61bca450", + "uuid": "022a8d92-099e-4b70-be77-6435132e8cfd", "control-id": "cis_fedora_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7095,7 +7131,7 @@ ] }, { - "uuid": "a304f2d0-5349-4e2f-9b95-b37b850f5fe8", + "uuid": "79a9edac-9b5b-425e-ad20-bca7dc466dfc", "control-id": "cis_fedora_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7112,7 +7148,7 @@ ] }, { - "uuid": "c121178c-b95d-4fbc-b802-108c037aeba3", + "uuid": "2174e451-2ca2-42ea-b66d-0c0d72a51cbf", "control-id": "cis_fedora_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7129,7 +7165,7 @@ ] }, { - "uuid": "b9af0f59-5730-4682-aa05-c27baf591fc6", + "uuid": "3dbad0aa-0e7e-414a-8f26-f634fec2976d", "control-id": "cis_fedora_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7146,7 +7182,7 @@ ] }, { - "uuid": "da224d93-e64f-48ed-8079-3cbf2b1a717a", + "uuid": "3b8177c9-9c49-493d-a8f3-79d93c2e9eaa", "control-id": "cis_fedora_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7163,7 +7199,7 @@ ] }, { - "uuid": "ac630e52-2311-4fe5-8718-0b61a7f61c49", + "uuid": "89211c25-1649-4b1c-bebc-f1a5eea011d9", "control-id": "cis_fedora_5-3.3.1.3", "description": "No notes for control-id 5.3.3.1.3.", "props": [ @@ -7180,7 +7216,7 @@ ] }, { - "uuid": "04020b98-eee3-4560-821a-7ea8ad157330", + "uuid": "60595401-6c6d-46eb-8b84-c79fca3eab85", "control-id": "cis_fedora_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7202,7 +7238,7 @@ ] }, { - "uuid": "5f5b5f15-57df-4837-9a54-b0b8dd57c7ff", + "uuid": "44e270d1-61c8-4a05-8932-35f41ebb3b2e", "control-id": "cis_fedora_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7219,7 +7255,7 @@ ] }, { - "uuid": "e553fb11-75c7-4be9-b717-c34fa296258a", + "uuid": "52053a23-7d8a-499b-a881-07197a41fe28", "control-id": "cis_fedora_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7241,7 +7277,7 @@ ] }, { - "uuid": "a10fb412-b305-41f7-ae75-a4e9ac2b8259", + "uuid": "a673def2-1d2a-42d1-80d2-98d3177b5563", "control-id": "cis_fedora_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7258,7 +7294,7 @@ ] }, { - "uuid": "86e331e8-2367-44e9-9238-dd4a67dcb25f", + "uuid": "0048d080-12d2-402e-8d12-f525559ccdab", "control-id": "cis_fedora_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7275,7 +7311,7 @@ ] }, { - "uuid": "2419ed39-8bcb-4f33-91c7-7b4d5993ef82", + "uuid": "53f1fdf0-08fa-4cf6-af96-a27197e30204", "control-id": "cis_fedora_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7292,7 +7328,7 @@ ] }, { - "uuid": "60e29487-bf50-4f6e-89ef-fd4e6e025ca0", + "uuid": "d50cbb24-960d-4a70-851c-472d27edeee8", "control-id": "cis_fedora_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7309,7 +7345,7 @@ ] }, { - "uuid": "ae7b3b80-77d5-44a1-a41a-88ed045e0fcf", + "uuid": "e8c125df-5e7d-4259-9dec-b0f604b6636a", "control-id": "cis_fedora_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7326,7 +7362,7 @@ ] }, { - "uuid": "494f321a-97c5-402e-ac98-0a5b5f05e824", + "uuid": "aee8eb80-da20-4c25-b4f9-b8363dbf06f7", "control-id": "cis_fedora_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7348,7 +7384,7 @@ ] }, { - "uuid": "4df2bc54-cb83-4f90-991f-7bf2c90e5f66", + "uuid": "238d0d89-12a5-4a1a-bd2f-22dcf545fd7d", "control-id": "cis_fedora_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7370,7 +7406,7 @@ ] }, { - "uuid": "4acce622-7083-44d0-b071-e6184d00781c", + "uuid": "17a83dda-556f-457e-ac10-135df3c25389", "control-id": "cis_fedora_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7387,7 +7423,7 @@ ] }, { - "uuid": "f703088e-aedf-4a4f-9a1c-b179679c5b91", + "uuid": "ce1e8499-aa58-4022-8716-01df94af5b84", "control-id": "cis_fedora_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7404,7 +7440,7 @@ ] }, { - "uuid": "f10fbf3a-d66b-4bc8-b7d9-717999fe6d98", + "uuid": "8767f5d3-cde4-4fde-9e61-973e2f376d3d", "control-id": "cis_fedora_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7421,7 +7457,7 @@ ] }, { - "uuid": "8f00fde4-47b2-40e2-acb7-73dab78a2cf0", + "uuid": "87f75e85-e5e6-461a-9752-120006a0cfe3", "control-id": "cis_fedora_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7453,7 +7489,7 @@ ] }, { - "uuid": "d1c6e44e-d9c1-4868-976e-929717d66c24", + "uuid": "cc51bdf8-f458-4fd5-8f7f-ceca9757067d", "control-id": "cis_fedora_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7475,7 +7511,7 @@ ] }, { - "uuid": "34cab0ff-6cfa-4cc6-b46e-64afa30f9635", + "uuid": "80833e58-ef53-4419-bdfb-49aec4e503ca", "control-id": "cis_fedora_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7497,7 +7533,7 @@ ] }, { - "uuid": "b5e09099-4b62-40ac-80f1-75f28e65e589", + "uuid": "36f0e00f-b017-425a-a268-29fb4ccf88d3", "control-id": "cis_fedora_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7519,7 +7555,7 @@ ] }, { - "uuid": "5ac1e044-c63e-4adb-8151-de2bfa35ff10", + "uuid": "fa213da4-27ee-4149-9647-720de97b0174", "control-id": "cis_fedora_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7541,7 +7577,7 @@ ] }, { - "uuid": "3718c93c-765f-4d94-a55b-11a61cf93ffc", + "uuid": "516d265b-34cf-4576-ada2-05a6820d3536", "control-id": "cis_fedora_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7558,7 +7594,7 @@ ] }, { - "uuid": "168793ef-3be4-41e7-a3fb-1f91163f2d37", + "uuid": "52c9ea08-e8b6-4de8-a1fe-07fa844f21f3", "control-id": "cis_fedora_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7575,7 +7611,7 @@ ] }, { - "uuid": "ecb52a0a-03d5-4a8a-9dc4-9bbdc7436a50", + "uuid": "6bc35f98-66c7-4a4e-994a-7b55d607298a", "control-id": "cis_fedora_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7612,7 +7648,7 @@ ] }, { - "uuid": "4e0d207f-3b0b-4334-922c-a896f105efb5", + "uuid": "12c851ba-e147-4cda-bc88-59cab5216afa", "control-id": "cis_fedora_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7629,7 +7665,7 @@ ] }, { - "uuid": "265291f9-83c9-42ba-be5a-1e292c7b1209", + "uuid": "0afa8545-b3ef-43c3-9236-779753a36bb2", "control-id": "cis_fedora_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7646,7 +7682,7 @@ ] }, { - "uuid": "5eab049b-88ed-42f0-9251-c9279922cbfc", + "uuid": "fb08244c-ed3f-4d7f-91e1-2282775d1e1e", "control-id": "cis_fedora_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7668,7 +7704,7 @@ ] }, { - "uuid": "bfa3039a-3bf9-4370-9778-80e326fceb16", + "uuid": "143a993b-e626-47a2-b4b2-e944fd366a24", "control-id": "cis_fedora_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7685,7 +7721,7 @@ ] }, { - "uuid": "06243a67-ce6f-4083-aed5-e4a7cd434eba", + "uuid": "18d761cf-7c86-4144-8695-8f039de9063a", "control-id": "cis_fedora_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7702,7 +7738,7 @@ ] }, { - "uuid": "b6379010-5e61-402c-81b2-8d1e99d4f8bb", + "uuid": "8f50fa1f-6229-4acb-a24a-62f1c2c25d91", "control-id": "cis_fedora_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7724,7 +7760,7 @@ ] }, { - "uuid": "add0fda7-447e-440e-a946-a2864ba65db3", + "uuid": "1900f9de-25d5-40f7-8460-4d4f8f8a5699", "control-id": "cis_fedora_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7806,7 +7842,7 @@ ] }, { - "uuid": "bdd343fe-3ca4-44df-9ef0-d051fff9c6c6", + "uuid": "798b2193-3779-43ae-aa97-fb91d005e686", "control-id": "cis_fedora_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7823,7 +7859,7 @@ ] }, { - "uuid": "ea7bd2d2-ba9d-4e7e-b0a5-af048248ccce", + "uuid": "f2710607-16a9-42d0-8d99-e255c19ea62e", "control-id": "cis_fedora_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7850,7 +7886,7 @@ ] }, { - "uuid": "02e0c552-8902-4846-b4c3-d1d591b45d5e", + "uuid": "5163552e-5c82-488d-a701-f803fa934668", "control-id": "cis_fedora_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7872,7 +7908,7 @@ ] }, { - "uuid": "8a593f90-b429-4a31-aec4-cf36c1c3f006", + "uuid": "a2644982-cf03-407d-a822-cdff1ded80b4", "control-id": "cis_fedora_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7909,7 +7945,7 @@ ] }, { - "uuid": "152e3856-8f2b-4bc2-9b3c-f9076943b549", + "uuid": "3b5feb6e-d31a-4792-869f-595abcda739a", "control-id": "cis_fedora_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7936,7 +7972,7 @@ ] }, { - "uuid": "816fae87-3fa0-4228-bd7d-beb0afc848d0", + "uuid": "33dccdd3-a5d7-45a9-baf6-d24eeaec79b7", "control-id": "cis_fedora_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7953,7 +7989,7 @@ ] }, { - "uuid": "116eb707-d574-4865-a9b5-77dcc89ae865", + "uuid": "e72e796d-6428-4e8b-9e5b-467114ca12a3", "control-id": "cis_fedora_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -7970,7 +8006,7 @@ ] }, { - "uuid": "ecc712d2-63d4-430e-bb2f-97707d5a19eb", + "uuid": "c39a07be-81d7-4462-940f-5b2c48861959", "control-id": "cis_fedora_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -7987,7 +8023,7 @@ ] }, { - "uuid": "e444dd6e-c6f8-41a5-b01a-15b0bdddd7cd", + "uuid": "1bfcda16-15a5-4763-9758-c8761ebe8d85", "control-id": "cis_fedora_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8004,7 +8040,7 @@ ] }, { - "uuid": "8c61f006-ee06-404c-b7eb-c9854ff73b94", + "uuid": "f69a9c21-9062-4ec0-844b-c5d4ed8fc0df", "control-id": "cis_fedora_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8021,7 +8057,7 @@ ] }, { - "uuid": "9d8f328a-604c-4d66-ab9e-89675ebb43b9", + "uuid": "a046b8e3-ffd6-47a0-9d5e-3c79687f6f3b", "control-id": "cis_fedora_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8043,7 +8079,7 @@ ] }, { - "uuid": "afc16ff6-f984-4152-a536-1d8fb5ea7412", + "uuid": "f73d3f02-7bca-478d-86d5-e3061e465209", "control-id": "cis_fedora_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8060,7 +8096,7 @@ ] }, { - "uuid": "0c5f10f0-560c-4fd7-80ef-f25d977e1618", + "uuid": "b58b0bc2-c978-4483-81e8-c2549154093d", "control-id": "cis_fedora_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8082,7 +8118,7 @@ ] }, { - "uuid": "fde79a29-5535-4dfa-81e6-ebe056bd5cd9", + "uuid": "ef455871-ddd6-4775-b7ff-b36f4306c051", "control-id": "cis_fedora_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8099,7 +8135,7 @@ ] }, { - "uuid": "ba495a43-1df1-4df0-8c63-2e5c1d67183b", + "uuid": "9eeef71a-55b2-462b-9ee7-bd2808d84926", "control-id": "cis_fedora_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8116,7 +8152,7 @@ ] }, { - "uuid": "67a1ae1b-b06c-49e0-b049-b125826b9019", + "uuid": "84d90d87-ad0e-49be-8c01-af37fa3dd597", "control-id": "cis_fedora_6-3.3.34", "description": "The description for control-id cis_fedora_6-3.3.34.", "props": [ @@ -8129,7 +8165,7 @@ ] }, { - "uuid": "1a5a62fa-ce11-450f-b38a-a6a9d85b7fda", + "uuid": "54488b5c-194c-47f1-9040-feac9c54c843", "control-id": "cis_fedora_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8146,7 +8182,7 @@ ] }, { - "uuid": "4a3b259a-8840-4de4-9be0-57479a0a862f", + "uuid": "bc52048c-e6f6-4ec9-bf96-5a0f53eecdd0", "control-id": "cis_fedora_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8163,7 +8199,7 @@ ] }, { - "uuid": "e8fa6970-ddcf-4662-95cc-5b4a15f2d6ca", + "uuid": "a7a14f28-c617-4b21-a5cf-a7c7f0bafb41", "control-id": "cis_fedora_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8180,7 +8216,7 @@ ] }, { - "uuid": "a551aaf3-5ae4-4b54-88d4-c0e704855135", + "uuid": "27203f70-1ba7-404a-a7f8-0ed1ad9ed06d", "control-id": "cis_fedora_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8197,7 +8233,7 @@ ] }, { - "uuid": "83b5338a-3cc1-44d7-a745-0e250dd029ac", + "uuid": "08bfe050-0301-4eca-9943-a0d8844da020", "control-id": "cis_fedora_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8214,7 +8250,7 @@ ] }, { - "uuid": "ba7cc418-ce9d-4667-8d1a-85a55ce18d0e", + "uuid": "54a0236c-16cf-4b2e-927c-3463ff39ffa5", "control-id": "cis_fedora_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8231,7 +8267,7 @@ ] }, { - "uuid": "3caf2272-c62e-43c5-b714-bac1ba1f68dd", + "uuid": "0b33cc5b-af55-4b5e-b486-fac2adf4a70f", "control-id": "cis_fedora_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8248,7 +8284,7 @@ ] }, { - "uuid": "b0acd920-9a8c-438b-bd08-93f8943b7394", + "uuid": "e5ba6d20-dced-407d-8152-4ccdfd3775c6", "control-id": "cis_fedora_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8265,7 +8301,7 @@ ] }, { - "uuid": "8d2c5c5f-96a4-4890-9e3e-0f15b6d1efac", + "uuid": "9d265b23-f0a6-40d1-a6c2-ef24e0a9d795", "control-id": "cis_fedora_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8282,7 +8318,7 @@ ] }, { - "uuid": "14f3514a-c62e-42dd-b023-ed22d8644e58", + "uuid": "fca3b565-b854-4a68-ba65-687a7b030494", "control-id": "cis_fedora_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8299,7 +8335,7 @@ ] }, { - "uuid": "d7d1fd22-5d09-4456-958d-143b3c38fffd", + "uuid": "a6674863-8c14-48bc-9035-0e417cbf129e", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8316,7 +8352,7 @@ ] }, { - "uuid": "ba22a5ca-c020-483f-a163-6e74f8d53956", + "uuid": "0da1e3f4-debe-4e20-be00-1885760fbb1d", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8333,7 +8369,7 @@ ] }, { - "uuid": "b6a698ea-cc44-4f6e-be8d-79d419374f9b", + "uuid": "36b79181-8492-4e80-af6f-2f7fbd33ad2e", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8350,7 +8386,7 @@ ] }, { - "uuid": "0fa3025b-a7a3-40d8-8e43-3740ec937f12", + "uuid": "bbddfc66-ec66-49a4-83f1-da855011bdaa", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8367,7 +8403,7 @@ ] }, { - "uuid": "305cfb36-a6d3-4113-b148-a2468bc985f7", + "uuid": "293d3951-77cd-4c48-ae0b-b80c38d3501d", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8384,7 +8420,7 @@ ] }, { - "uuid": "ea92d2a9-d397-4199-b242-81b3ad83aebb", + "uuid": "9fc99455-6d54-41cb-9865-d8e6ae60dc15", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8401,7 +8437,7 @@ ] }, { - "uuid": "7ed9f3a8-4ddd-4eef-9226-d3a7a9ae4107", + "uuid": "95c892f5-cb86-4f80-aee4-1129032a8b1c", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -8414,7 +8450,7 @@ ] }, { - "uuid": "d1584ec3-46c0-43a4-9f65-d25d18b5421f", + "uuid": "a76b27d0-3cef-4a3e-a7ef-097e1baaaa0f", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8431,7 +8467,7 @@ ] }, { - "uuid": "fb97dbfa-6664-4640-ae54-206178e2a080", + "uuid": "71e8fa7c-c3bb-4a4f-a4b3-922cebc0fd0e", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8448,7 +8484,7 @@ ] }, { - "uuid": "11a8e76c-8a2a-4711-941a-d5c3122bcecd", + "uuid": "c214f1f6-194a-48dd-9153-d1044db10bad", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8465,7 +8501,7 @@ ] }, { - "uuid": "9a1ff972-60a5-4a01-8ca4-7dd4dde5227f", + "uuid": "b11e9532-5210-4c3f-829d-0344364e7551", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8482,7 +8518,7 @@ ] }, { - "uuid": "c96520a6-98b9-4779-8162-07b5f9bc9191", + "uuid": "9cd3741a-ea79-462d-ba0f-f2961784ecf9", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8499,7 +8535,7 @@ ] }, { - "uuid": "5dadff47-1f54-4aff-aee5-c0754dcdac08", + "uuid": "da46f8f8-0e6f-4ddb-bce3-522046ea52e1", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8516,7 +8552,7 @@ ] }, { - "uuid": "cfaec490-c11f-4dd2-9dc9-5bbc8e8fc35e", + "uuid": "645d955d-93ec-475a-96da-6c6427101459", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8533,7 +8569,7 @@ ] }, { - "uuid": "8a83b48f-c8c4-43c6-aa96-20b104aa8229", + "uuid": "782e475e-267f-4ab8-8a28-6b2b933e0205", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8550,7 +8586,7 @@ ] }, { - "uuid": "a7f7eecc-fce3-4d49-bd65-9575633af6e8", + "uuid": "aec4800f-7a25-4659-bb98-9434cc561155", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8567,7 +8603,7 @@ ] }, { - "uuid": "c792cc6e-4f3e-4fde-99c7-5a5abd76f3ed", + "uuid": "44370d58-775b-428b-be97-cdc05ac70548", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8584,7 +8620,7 @@ ] }, { - "uuid": "4fc2f769-8a61-4fa2-b79b-0402a363ad07", + "uuid": "48971239-9774-4e8e-b8e3-489036d7a234", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8601,7 +8637,7 @@ ] }, { - "uuid": "c084f77b-1b55-4520-aa64-f6646a00b1b1", + "uuid": "b337d802-672f-470e-8d85-309f253f720d", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8618,7 +8654,7 @@ ] }, { - "uuid": "0211f1ff-575e-485c-9361-c855b7f55b2c", + "uuid": "3f5513cd-12c6-43e2-9858-c9fd78c01876", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8635,7 +8671,7 @@ ] }, { - "uuid": "4cd75d01-9fbe-481d-b213-ba8ba204b618", + "uuid": "a64b6284-849a-4b26-859b-8fc96defbacb", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8652,7 +8688,7 @@ ] }, { - "uuid": "8c6bcb63-f54b-4304-8598-4368a0f93915", + "uuid": "62f3f9aa-2e28-4b1d-bf45-3fbc4b1a1f4e", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8669,7 +8705,7 @@ ] }, { - "uuid": "c3ce18df-3f3c-4d6d-ab32-3acd5f088361", + "uuid": "d7f94e29-7bea-442d-9412-ff7f10752fab", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8686,7 +8722,7 @@ ] }, { - "uuid": "6fafdf33-75f0-4bf2-b75e-12d3c89fa1be", + "uuid": "6476b54b-06e5-406e-b8a3-8d922641d54f", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8703,7 +8739,7 @@ ] }, { - "uuid": "62f6264b-ac7e-45b4-967e-1a52d325b8a2", + "uuid": "6e207785-1594-4958-bcfd-b1776cf9181c", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8720,7 +8756,7 @@ ] }, { - "uuid": "4329ba48-1149-4978-b1e4-08a227ffdad8", + "uuid": "6d1f3e8c-0c59-4798-9b24-74fffdbaea37", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8737,7 +8773,7 @@ ] }, { - "uuid": "55420f00-a380-4a10-a265-e132e4bf89e4", + "uuid": "cab6ab72-e3ad-459b-800a-767543c7bcae", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8754,7 +8790,7 @@ ] }, { - "uuid": "f59b4048-c8ab-4a8f-841d-645b90301f6e", + "uuid": "44c5cbb9-fcee-483d-9b18-ef9f5787129a", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8771,20 +8807,24 @@ ] }, { - "uuid": "b2f36ba5-b412-4476-a027-55ea8abb2b55", + "uuid": "194717e2-d5f4-4d35-a76c-38148319e76c", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "e21a3c1d-e95c-495f-9bc1-9dc1946ceefa", + "uuid": "28b9605d-fa4d-4141-a2f2-7336eb98d174", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8801,7 +8841,7 @@ ] }, { - "uuid": "30492b8b-76bf-491c-8033-c1c8aa2c64ea", + "uuid": "ef984e34-7b89-4c97-ae39-c1d379f12e99", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -8814,7 +8854,7 @@ ] }, { - "uuid": "cc7acecd-bbde-4980-a316-ed7f345d3983", + "uuid": "c06de515-0484-46da-b378-f6bdc5c5d4ea", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -8827,7 +8867,7 @@ ] }, { - "uuid": "851ab5ab-889d-4bde-9adf-09b2ff059b3a", + "uuid": "bdd3f562-02a1-41c9-99d0-ba6da274a92d", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8844,7 +8884,7 @@ ] }, { - "uuid": "304044b7-f64e-4d48-ae1f-82cfeab9d449", + "uuid": "4cf89024-bfc7-461b-8a5d-45a384682839", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8861,7 +8901,7 @@ ] }, { - "uuid": "637dea87-5131-4d1e-86f5-7ca04e9b11c1", + "uuid": "d1a328d6-44c5-4f84-9c72-afc9d1e27d58", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -8878,7 +8918,7 @@ ] }, { - "uuid": "836bdae0-bfc2-4495-b81e-b329a9071cf6", + "uuid": "4118cbea-835c-413e-a4ed-6d0cc031e623", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -8895,7 +8935,7 @@ ] }, { - "uuid": "2c71286a-379c-4bb4-899a-338a68d6a829", + "uuid": "def92e9d-9e78-4120-bffd-7d5c5b050b58", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -8912,7 +8952,7 @@ ] }, { - "uuid": "0b2348a0-e1c5-43c2-81e6-379f0f0c55fb", + "uuid": "ef3cd296-bb24-4300-b4b6-aac078ef0774", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -8929,7 +8969,7 @@ ] }, { - "uuid": "58164a43-052d-4c5e-a515-00bc829c1a62", + "uuid": "cca53b69-0c93-4bd5-9865-5868a1245794", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -8956,7 +8996,7 @@ ] }, { - "uuid": "3fb8cc21-4ee5-4657-b475-d14b0e7b1bf7", + "uuid": "d17caa98-5c7e-41bd-81d9-523b1a11bf55", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -8973,7 +9013,7 @@ ] }, { - "uuid": "2dd9ed11-e809-46d0-b61a-ab114dce982e", + "uuid": "cc72ae4d-99ca-47ab-9864-2335cff25aaa", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -8990,7 +9030,7 @@ ] }, { - "uuid": "ce603725-6779-4bb1-9732-bb27355b710b", + "uuid": "8c198c4a-d37e-4745-86b8-3cee0b19632a", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -9007,7 +9047,7 @@ ] }, { - "uuid": "1dec765e-e542-44a9-8764-f0bd47fbd177", + "uuid": "9aa1d022-76da-471a-889e-3e3c7b2760b1", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9024,7 +9064,7 @@ ] }, { - "uuid": "f34558b4-382a-46ae-9326-8e890285ffcf", + "uuid": "87bb7cd9-2a00-4197-b21e-3a8cae507b44", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9041,7 +9081,7 @@ ] }, { - "uuid": "bbd80aa8-22d5-408f-a537-3636c7447cb7", + "uuid": "f679afef-c556-4589-a8d8-58435114ecbd", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9058,7 +9098,7 @@ ] }, { - "uuid": "6b446f56-8392-4c43-8388-7581f50afadb", + "uuid": "2fa16127-cbb4-40a1-ab54-2799f3265f42", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9075,7 +9115,7 @@ ] }, { - "uuid": "a82148b2-cfa6-45c1-b0c0-20ec33770bca", + "uuid": "835c64b3-2262-4bc9-8144-008c379f7439", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9092,7 +9132,7 @@ ] }, { - "uuid": "07cf9669-d70c-4709-bd06-1e2e935ae93e", + "uuid": "b34ae5bb-5b79-4ec2-93ba-0eabfd94f211", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9109,7 +9149,7 @@ ] }, { - "uuid": "40477f41-df99-4326-b707-e15f4f40ecce", + "uuid": "d97c15e1-cdfd-454d-a25b-99312993cfc2", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9126,7 +9166,7 @@ ] }, { - "uuid": "61eb5c07-a3c1-4327-b89c-e4c9a39f4d8e", + "uuid": "0d0f90c3-a301-4874-9b9a-0e56d39f0516", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9143,7 +9183,7 @@ ] }, { - "uuid": "2b9f4dcb-777a-4462-8b11-69b60af900ce", + "uuid": "e73a67a0-2e98-4ba0-9896-c23b9012d903", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9160,7 +9200,7 @@ ] }, { - "uuid": "cdf22440-e7b9-4344-9d71-50a26a2fc904", + "uuid": "cce35973-c558-4ac2-bcd1-8607143903df", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9177,7 +9217,7 @@ ] }, { - "uuid": "50c95421-1130-4d3d-bd58-53bb5e6eb617", + "uuid": "fb519391-6268-47a9-8c18-f2ebcf3010f8", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9194,7 +9234,7 @@ ] }, { - "uuid": "f8458320-8ddf-4d9a-baea-a868110bb7e0", + "uuid": "6dac8807-cc17-408b-af21-36cda093fe50", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9211,7 +9251,7 @@ ] }, { - "uuid": "6451a6bb-a294-4787-a3e8-b447721fccf2", + "uuid": "88fe9e46-8276-4025-97f8-647959e330b4", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9228,7 +9268,7 @@ ] }, { - "uuid": "fc4aa50a-df30-45d4-8f45-5e6c30493f68", + "uuid": "4beb7b43-21db-44ad-a7a7-c9205ac31187", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9245,7 +9285,7 @@ ] }, { - "uuid": "3ae06428-9d62-4135-9fc2-2e03e2c66516", + "uuid": "50349407-e4ba-45be-9b8f-b00827cf2ee9", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9272,7 +9312,7 @@ ] }, { - "uuid": "06bc757f-e974-4ec8-a358-245afd928c60", + "uuid": "bf44c26b-2546-4c83-9329-2f63875d0e88", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9299,7 +9339,7 @@ ] }, { - "uuid": "36b6ba91-2dd1-40b2-9795-5ea4b74415d8", + "uuid": "72468f17-7c9e-4a1c-9a8f-dce7ac586bdf", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9326,7 +9366,7 @@ ] }, { - "uuid": "51397714-a9a5-491a-9c25-44a6332bb74f", + "uuid": "97f1fabc-cfc3-4700-bae7-1fc22c497d20", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9348,7 +9388,7 @@ ] }, { - "uuid": "b7b69ee8-0c93-4ada-af4f-2d00dd170229", + "uuid": "e74218b5-3e45-4cc7-965e-9c096b61e7ca", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -9365,7 +9405,7 @@ ] }, { - "uuid": "59ee06f5-69c6-4c97-bae5-ce69ba8cbc13", + "uuid": "777e4c3b-24d3-4704-b2fb-980165a55af8", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9397,7 +9437,7 @@ ] }, { - "uuid": "73f9dede-7db8-4eef-86cb-bc0c1a5588d1", + "uuid": "9ffef33a-7108-460f-98f0-3305ccb4a27f", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9414,7 +9454,7 @@ ] }, { - "uuid": "3893fb78-59fd-4ddf-aff0-8eade67075dc", + "uuid": "174993cd-0d71-4f93-ab59-e044f77ff440", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -9427,7 +9467,7 @@ ] }, { - "uuid": "46e4c54b-0443-4ad0-8a5e-9f40276f695c", + "uuid": "5b8b12f6-a885-4e31-8deb-ebee657f6bf8", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9444,7 +9484,7 @@ ] }, { - "uuid": "1b6b2e43-af7b-422a-9617-91b1c719803e", + "uuid": "70d472cc-1eb1-4a3e-a837-6220d78b2f19", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9461,7 +9501,7 @@ ] }, { - "uuid": "6a1feec7-10e9-4c44-88b4-526d3565c453", + "uuid": "c3b0f07b-f2cb-4e03-9496-2abf0a79c6f8", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9478,7 +9518,7 @@ ] }, { - "uuid": "cddd60c9-5a3d-4737-b5b8-f57187fd9ecf", + "uuid": "9a85193a-604f-4659-89fe-73644bc0d8c0", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9495,7 +9535,7 @@ ] }, { - "uuid": "c888d159-233c-441c-a683-79808b6e2c54", + "uuid": "6aafa5a3-ba5d-4709-b966-da1ba490c189", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9517,7 +9557,7 @@ ] }, { - "uuid": "5aae262a-09ab-4d3d-9441-7021a4042b36", + "uuid": "3540fdad-89b3-448d-858a-e45424a79f7a", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9534,7 +9574,7 @@ ] }, { - "uuid": "66a6b148-7145-4eac-954e-d4df28e98e8b", + "uuid": "0031a642-7cdf-4325-b1a3-a947bd955e06", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -9546,7 +9586,7 @@ ] }, { - "uuid": "9e16c3ec-2715-43a0-9d01-42f03547bb80", + "uuid": "e32aebeb-42a2-4671-9c0a-ebd74f3f73b4", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9563,7 +9603,7 @@ ] }, { - "uuid": "197cce54-7649-4de4-8555-16a84cacb618", + "uuid": "506842f2-16fb-4cfd-943e-361976ea624a", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9580,7 +9620,7 @@ ] }, { - "uuid": "af16bf22-bcb8-486c-a7f0-7d49119aeee9", + "uuid": "ae614f6a-12e9-4285-b53a-85b202a9071f", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9597,7 +9637,7 @@ ] }, { - "uuid": "4f184789-ec56-4ec2-9e24-99e960198e80", + "uuid": "7746bf4f-e5c0-4975-9813-f4cee735e1cc", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9614,7 +9654,7 @@ ] }, { - "uuid": "c33fe099-4512-45df-a5ad-f13c67f4fbb0", + "uuid": "7be43da0-dbf7-46ef-8f8b-33a8e86adb5e", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9631,7 +9671,7 @@ ] }, { - "uuid": "fb9c1ac3-172f-43a4-a42b-c5a80ca87c15", + "uuid": "7b95bdb3-4677-4a12-88ef-907424221648", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9648,7 +9688,7 @@ ] }, { - "uuid": "6ecb8142-93e4-47a3-9f8b-5611c35dfde8", + "uuid": "9f7e27bb-31dc-49f5-bd28-7a4f2ea59b18", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9665,7 +9705,7 @@ ] }, { - "uuid": "1e0092ff-2e61-42bd-86c2-4aca34323755", + "uuid": "d6838693-ad25-4623-918d-eafe2b2a2141", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -9687,7 +9727,7 @@ ] }, { - "uuid": "a8cc7009-bba2-431e-8619-143778a50776", + "uuid": "d0f8d944-4512-4bb0-be02-98ae74cc72b6", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -9700,7 +9740,7 @@ ] }, { - "uuid": "b7216474-4d17-4f82-9690-d053bb6adec3", + "uuid": "c4d2c528-8817-4472-9ec9-5ce15f08ad54", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -9722,7 +9762,7 @@ ] }, { - "uuid": "87b9e305-62e8-4ffb-b5aa-99d3e50e13dc", + "uuid": "92c227ae-2bb0-49d0-86c9-df80efeab7a6", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -9735,7 +9775,7 @@ ] }, { - "uuid": "a22df8d3-7939-4be9-bd8e-3daa064ea186", + "uuid": "2e569126-93e0-4883-8e12-13bc4b302e65", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9752,7 +9792,7 @@ ] }, { - "uuid": "e4e08121-4eb8-440f-9a98-eab820732488", + "uuid": "2865dd62-e223-4fef-aed9-7a20fc846c26", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9764,7 +9804,7 @@ ] }, { - "uuid": "e978b45b-8447-4d07-9e16-e290130a2c50", + "uuid": "3ff37e65-1251-43ab-ab76-9ce7c11e7c60", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9781,7 +9821,7 @@ ] }, { - "uuid": "d4d0d843-083f-48cc-98b1-701f5f2642e4", + "uuid": "2ca2b431-cf9e-4408-b7ff-3642fffcc1bc", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -9798,7 +9838,7 @@ ] }, { - "uuid": "ab02b290-b2f6-463f-afad-0615135d9897", + "uuid": "cbb376d8-1e92-4a42-9288-3d9adcef9cf6", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9810,7 +9850,7 @@ ] }, { - "uuid": "bc1958a5-afa1-4893-a0b0-24c15121fe01", + "uuid": "9e71c8de-6e52-40f9-a319-647ab746fa5b", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9827,7 +9867,7 @@ ] }, { - "uuid": "61e82b10-8a6f-41c0-a5cc-abe2e1fedcbd", + "uuid": "637530a5-0417-411b-b5ab-96acad3ba395", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -9844,7 +9884,7 @@ ] }, { - "uuid": "1babdcda-1602-4a16-9105-40190d1db410", + "uuid": "371352da-2b6a-4a8f-9857-a6eac7c62148", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -9866,7 +9906,7 @@ ] }, { - "uuid": "7e869096-7d83-4cd1-89da-2151452f58a3", + "uuid": "2a5596de-44d4-4f82-b807-3c3404a57015", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -9893,7 +9933,7 @@ ] }, { - "uuid": "300d9c01-23b1-4e47-8635-fca732facaff", + "uuid": "6319630b-afb6-41ac-9921-d900ea0d840d", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -9920,7 +9960,7 @@ ] }, { - "uuid": "70bbe4ed-245c-4447-b626-8ab55e00feaa", + "uuid": "91662436-aa82-4b3c-8044-c5eefe3f5c24", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -9947,7 +9987,7 @@ ] }, { - "uuid": "3a45ae6f-7e84-4396-95a5-007cca5b22f0", + "uuid": "6e743f77-dde0-463b-b691-8d431ba83d71", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -9974,7 +10014,7 @@ ] }, { - "uuid": "33f859f6-b66b-4291-9512-14e889355c72", + "uuid": "9bde4f19-5801-4522-b630-f8a2165b41df", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10001,7 +10041,7 @@ ] }, { - "uuid": "53dda700-14ed-4de2-a014-eb968ddf50fc", + "uuid": "38875237-351e-447e-bd3c-bcbf92262042", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10028,7 +10068,7 @@ ] }, { - "uuid": "ff5a28d0-b173-487d-858c-32a6aa37a83f", + "uuid": "dff62ac5-1dd5-4ec8-9136-e552039e8a59", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10055,7 +10095,7 @@ ] }, { - "uuid": "69586d16-997d-4be8-8398-691f0bb985dc", + "uuid": "14778272-b2da-4b73-8432-e35491b68a9c", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10092,7 +10132,7 @@ ] }, { - "uuid": "c715bc25-ef72-4204-a2a0-a70000267ca4", + "uuid": "e03bfff3-c48f-47c0-a162-da04f9316f14", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10129,7 +10169,7 @@ ] }, { - "uuid": "5fe42c67-37db-41c5-af1d-c497d32b168a", + "uuid": "be8ac1a7-3466-4a03-983e-b599813511cc", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -10142,7 +10182,7 @@ ] }, { - "uuid": "06b56b3c-5aad-4958-81f5-ac20d1d78ffb", + "uuid": "30f4df0f-acfe-4ec1-8e4f-a8565751704c", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10159,7 +10199,7 @@ ] }, { - "uuid": "94bb068a-44b3-4259-ac14-169b5db7083c", + "uuid": "1bf21c57-aece-4625-8af8-8d3182d79f53", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10176,7 +10216,7 @@ ] }, { - "uuid": "fbeb3e1e-7d95-4a65-b2f2-51a0ad4bd3c7", + "uuid": "5cf8f74e-928a-4586-9c66-c8b113152797", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10193,7 +10233,7 @@ ] }, { - "uuid": "3f363c68-e5fc-42dc-a4a1-e75f34d4c715", + "uuid": "1b2e71aa-1898-41f1-beb6-0b99f3cb8cc4", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10210,7 +10250,7 @@ ] }, { - "uuid": "e4517e90-2a5f-4305-b39f-b617c9702dc7", + "uuid": "5861060b-3052-455a-931f-3aaf69187355", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10227,7 +10267,7 @@ ] }, { - "uuid": "30b420b0-7e64-452f-84eb-9551bdb43147", + "uuid": "9e65a534-5dd7-43b1-9973-61214462f1cf", "control-id": "cis_fedora_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -10244,7 +10284,7 @@ ] }, { - "uuid": "cfc3fcbc-5e41-4ea7-8f0b-c6b1a2fdc46e", + "uuid": "75db322c-ecbb-42fa-95ed-0300f3e238e3", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10261,7 +10301,7 @@ ] }, { - "uuid": "0f0e5cfa-9b53-4e79-8e99-fc4eebd14469", + "uuid": "578528ba-5b9a-4691-a434-bac801f71171", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10278,7 +10318,7 @@ ] }, { - "uuid": "917d0506-a0b4-446f-9485-9f7406bbad9e", + "uuid": "ef79e096-d9d8-4d7a-a9ed-c7837802f974", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10295,7 +10335,7 @@ ] }, { - "uuid": "d01067d8-1979-458f-bf3c-9e90f3423007", + "uuid": "4cef91ea-3801-4d98-b553-4dd06d3e26eb", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10312,7 +10352,7 @@ ] }, { - "uuid": "688de438-bcbb-498f-b291-53cf9439c6e9", + "uuid": "9e46eac9-9a15-4c18-9d0d-90fa468e5440", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10329,7 +10369,7 @@ ] }, { - "uuid": "1b005906-1d75-4111-8465-8c4ff091f7b4", + "uuid": "ac7ab92d-ba00-4950-a251-9c9de30a489e", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10346,7 +10386,7 @@ ] }, { - "uuid": "eaa74e74-6ff1-4d15-9126-d0aaf46f1ccc", + "uuid": "2e5b60a1-ebba-4f9d-bfd1-45c48a8e73ef", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10363,7 +10403,7 @@ ] }, { - "uuid": "3446f244-d93b-48f8-913a-65cc5d87ea8b", + "uuid": "693023c7-de94-4232-9e80-645d8cf98e58", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10380,7 +10420,7 @@ ] }, { - "uuid": "9a75402b-6977-4aff-9a86-0817d7787de9", + "uuid": "308bfdad-c3d2-4db5-9b77-c78a0f665bf7", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10397,7 +10437,7 @@ ] }, { - "uuid": "71c05d04-f8a9-4877-8034-231d5ae964ab", + "uuid": "4364909a-fc22-4ce4-ad77-44d896031b52", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10414,7 +10454,7 @@ ] }, { - "uuid": "f690c950-6f7f-49af-aa3d-c8ce68ce3e63", + "uuid": "b31198b0-1482-49e2-9b95-d90048ebd918", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10431,7 +10471,7 @@ ] }, { - "uuid": "2f71a6e8-36df-46b0-8032-cb8efb35256a", + "uuid": "c01d6a1a-f520-464f-93e9-880bf25d080f", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10448,7 +10488,7 @@ ] }, { - "uuid": "814bbbc6-ee14-426e-bb68-c95421d79520", + "uuid": "d65786b9-9958-4682-bb2c-607c7c804713", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10465,7 +10505,7 @@ ] }, { - "uuid": "2c4670d9-b807-485e-bdc0-f60ffcb5a2bc", + "uuid": "f06dae6c-40cf-47b6-b505-30671341ed39", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10482,7 +10522,7 @@ ] }, { - "uuid": "d36cefe7-c0c1-4ca3-ad5e-4074f93bfec1", + "uuid": "7a21e4e3-fd16-4fcc-aee4-62c7180a689c", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10499,7 +10539,7 @@ ] }, { - "uuid": "aee47ad3-9a6d-491a-a2f5-790816c502f4", + "uuid": "56bc57cb-9cc9-4224-9658-22b253c62cfd", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10516,7 +10556,7 @@ ] }, { - "uuid": "3f77d425-c4b8-4050-9797-b3b67c31eca6", + "uuid": "efa11484-7355-4246-a49b-259bcd3b2daf", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10533,7 +10573,7 @@ ] }, { - "uuid": "aec7efdf-95ef-4809-b3b5-b4f7789b96b6", + "uuid": "15d6e6d2-844f-403c-ad21-24eaf28c18b3", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10550,7 +10590,7 @@ ] }, { - "uuid": "85e0712b-4c57-4031-8d5e-5a048d7bb87a", + "uuid": "dad946d9-3048-4739-aed5-c170e6044eba", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10567,7 +10607,7 @@ ] }, { - "uuid": "2bdc2d76-5127-4a91-b5cf-7d999e673aee", + "uuid": "28828a46-6bea-464a-99b3-e92bd7a4bd8a", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10584,7 +10624,7 @@ ] }, { - "uuid": "20157403-9268-4a11-9d59-8fd808671d6b", + "uuid": "09716bfd-9e8e-4f05-9918-94955177657a", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10601,7 +10641,7 @@ ] }, { - "uuid": "c6481646-efe2-4773-bb6b-359ddea90412", + "uuid": "ec1f57c9-d722-41ef-9e11-cfbf7d283290", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10618,7 +10658,7 @@ ] }, { - "uuid": "f591417a-f9d5-4727-9bad-0ace31effbbb", + "uuid": "1cc9f820-0c1e-44e2-9bec-4245ea3ef893", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10635,7 +10675,7 @@ ] }, { - "uuid": "6b9586fa-3c6f-4a4f-89cf-ed44b7c49475", + "uuid": "7ad92176-ef78-4dc3-ab91-102fc79edd4c", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10652,7 +10692,7 @@ ] }, { - "uuid": "65e05ddf-d44b-45b6-9d13-a58bd9f09933", + "uuid": "2fa36e94-8c77-482b-9cba-5b3ccbaacf04", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10669,7 +10709,7 @@ ] }, { - "uuid": "d1dcb287-1ae0-470d-b85f-fbc9f99a233a", + "uuid": "a2e4b3f9-55ba-4b4f-bfd0-75412c3c4012", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10686,7 +10726,7 @@ ] }, { - "uuid": "54d3ad14-eab7-43c6-811a-91b9adc81a37", + "uuid": "37640fd5-be1d-4f5b-9e86-172dd9614839", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10713,7 +10753,7 @@ ] }, { - "uuid": "7c3422a5-dc5c-49a1-b07b-622d000651a5", + "uuid": "f9571a7c-8954-4be1-9512-3dd197e4f089", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -10726,7 +10766,7 @@ ] }, { - "uuid": "4d4ab0cb-f64a-452e-8430-2ca4268816d2", + "uuid": "73093701-77ef-4ab5-bcde-95f8080f28ff", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -10748,7 +10788,7 @@ ] }, { - "uuid": "4faf6d7c-b5b0-4119-8bb9-fa959ba630a6", + "uuid": "cc8a7a09-0cdf-48ca-a2e0-145dfa895e13", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -10760,7 +10800,7 @@ ] }, { - "uuid": "145e86a7-53cd-4a7d-a86a-64cfd3e07641", + "uuid": "d5a9288f-5622-401c-b0db-165dafa8b32a", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -10773,7 +10813,7 @@ ] }, { - "uuid": "88cab241-dbd0-45d4-89c8-c0aab8eac090", + "uuid": "7b904658-47fd-473e-abbc-864ca51ec92b", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -10785,7 +10825,7 @@ ] }, { - "uuid": "c39499b7-ad89-416d-9ca8-680efb2baaf0", + "uuid": "e02ec60f-d5b5-4aad-be4d-85e9da620ec5", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -10797,7 +10837,7 @@ ] }, { - "uuid": "844b7ff2-3260-4907-bbfb-84a2015cc39c", + "uuid": "18c89e84-3fb4-4a55-bb88-ac38721b1869", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -10854,7 +10894,7 @@ ] }, { - "uuid": "91aa53e4-db6f-4b7b-8692-0d9144d5206f", + "uuid": "1a78d720-a974-4a4b-8966-eb1195edd06c", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -10881,7 +10921,7 @@ ] }, { - "uuid": "c40d8a6a-8f60-4b4f-88b2-6e40c63eb611", + "uuid": "fea41fda-d330-4197-b748-de537b081af5", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -10908,7 +10948,7 @@ ] }, { - "uuid": "1ecef886-8f1a-4392-bc1f-a682295740cd", + "uuid": "602c9f27-6b74-46c6-af41-08d6adfdfcc0", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -10925,7 +10965,7 @@ ] }, { - "uuid": "470c2d5f-a8c1-4816-acde-dd953c82ac6c", + "uuid": "5c4163e3-a0da-45b3-ae78-c6927efdf745", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -10942,7 +10982,7 @@ ] }, { - "uuid": "8f84190d-d393-4560-a061-d1c36815bd76", + "uuid": "7803b79f-1a89-4f7d-90f9-62c48fe81211", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -10959,7 +10999,7 @@ ] }, { - "uuid": "82b71f0f-907a-40dc-9c53-bce95dd0be12", + "uuid": "a83c1942-7a17-4d21-b37e-4cea2d6b1186", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -10976,7 +11016,7 @@ ] }, { - "uuid": "e1f77097-1e9a-49d3-801d-54a1f437f2db", + "uuid": "2b782e0f-bdeb-4dc5-ba36-e2c25d34c0cd", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -10993,7 +11033,7 @@ ] }, { - "uuid": "de7284b7-23aa-45a4-b2a0-95d4bf0a9553", + "uuid": "6afb118b-271f-403a-a9c6-cbdc5a36d9fd", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11015,7 +11055,7 @@ ] }, { - "uuid": "735f2000-8f09-4db2-ada0-a089b3785f2a", + "uuid": "627e3d38-dbf2-45f1-b5d6-0914171481a5", "control-id": "cis_fedora_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11032,7 +11072,7 @@ ] }, { - "uuid": "523e4648-31c2-40e6-a68b-a576db56fceb", + "uuid": "269eee2a-bda8-4594-96ba-f47d8ced6629", "control-id": "cis_fedora_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11049,7 +11089,7 @@ ] }, { - "uuid": "92f1bca7-985d-449e-b409-ff7128d8eb9b", + "uuid": "e5576b60-3bac-4a6d-a500-ef6fe197bce1", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -11066,7 +11106,7 @@ ] }, { - "uuid": "dd459bc4-dc14-459f-8131-e02b1ac1c286", + "uuid": "a7740747-e4e0-4eb2-b2f9-7f5ff28134f5", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11083,7 +11123,7 @@ ] }, { - "uuid": "0df5c87b-4a1b-4ef0-b1c1-b73b464f6d2e", + "uuid": "b155ebdb-d9e1-42db-a654-e27f204ac9a4", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -11100,7 +11140,7 @@ ] }, { - "uuid": "e89b9e79-58ab-4b3f-9fe0-19b7fc1c5748", + "uuid": "74a39a78-a0ae-46a4-9374-7ee7beb181b8", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11117,7 +11157,7 @@ ] }, { - "uuid": "1d72ba74-e826-4902-ab98-32019a97b7fd", + "uuid": "48501e7d-f2d3-41ee-a1ac-993f7467afbd", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11134,7 +11174,7 @@ ] }, { - "uuid": "402aa90b-2003-4ec5-815a-3d8c6fdcaf85", + "uuid": "ba56f2d8-be88-4b8f-8d62-ada03fe244c6", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11151,7 +11191,7 @@ ] }, { - "uuid": "dc9f4b1c-3e8c-4f34-918a-cf3fa0232766", + "uuid": "6b6f45f9-d98b-44bf-9aa0-2e4fecabf2a8", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11168,7 +11208,7 @@ ] }, { - "uuid": "eb812967-35d6-4d16-911f-09c36af5e8ad", + "uuid": "7861def7-b6db-4ab3-a361-871098c66863", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11185,7 +11225,7 @@ ] }, { - "uuid": "ad0603b1-a4b6-42c9-8b9c-a34227e2bd23", + "uuid": "83dfa89e-a471-4409-ae2b-98d979c83ac3", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11202,7 +11242,7 @@ ] }, { - "uuid": "860ba568-3fdd-4a9e-be5b-59b2e55d8b63", + "uuid": "ad76445b-f3d2-49d3-9f54-c148426d1ea8", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11219,7 +11259,7 @@ ] }, { - "uuid": "0cd51cf0-1f44-4ccc-9d10-53389f5bf958", + "uuid": "ac74741d-d762-4e76-92a2-ce092eb52704", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11236,7 +11276,7 @@ ] }, { - "uuid": "b558c032-19b6-4e3a-b576-77e4e9110f86", + "uuid": "c3918e39-c2cd-441f-8bc6-678fc1edbc4a", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11253,7 +11293,7 @@ ] }, { - "uuid": "e70a9062-a18c-42cf-ba2d-ce15e3d0bf08", + "uuid": "4ee5ac32-1920-49a6-be05-9d359e3ebb4e", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11270,7 +11310,7 @@ ] }, { - "uuid": "9fc858f3-10af-49b4-b6ec-06d15bc0322a", + "uuid": "f119af02-cb5e-4218-8ec0-8a827593c9da", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11287,7 +11327,7 @@ ] }, { - "uuid": "491a60ac-ef82-4d74-abd4-b2854513727b", + "uuid": "6ab34792-1105-4293-8524-b5bdd2bd9180", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11304,7 +11344,7 @@ ] }, { - "uuid": "f0952c91-310a-4b40-b95a-f3063d408cd2", + "uuid": "885dae96-3c3d-4713-a34a-c098e64a554d", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11321,7 +11361,7 @@ ] }, { - "uuid": "dff985ff-6037-440a-9a20-f4020f91c178", + "uuid": "81ee1d9e-10c2-42ec-a07c-00a4447a1614", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11343,7 +11383,7 @@ ] }, { - "uuid": "b955f017-9482-434e-8fa5-bcb4e14f718e", + "uuid": "d64d0752-8dbe-4bc5-9c8e-36d0fc97489a", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -11356,7 +11396,7 @@ ] }, { - "uuid": "5103cc4d-f85a-420c-8fe7-5cb9a39866b6", + "uuid": "219d7a42-e442-4e48-8a44-500ab011a1a1", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -11369,7 +11409,7 @@ ] }, { - "uuid": "22aa9a04-3c08-46db-90f3-8e18f85d33a2", + "uuid": "2c1829f8-7196-4dba-af56-c231b8c96e43", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -11387,7 +11427,7 @@ ] }, { - "uuid": "2c8351cc-ebd8-4f3e-865c-1a106d25821c", + "uuid": "a187d19e-16d4-4f74-8dc7-26e4652241fc", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -11404,7 +11444,7 @@ ] }, { - "uuid": "f4312b4d-9af1-46b0-bdf1-bf429b63906a", + "uuid": "ffa1fc6d-a683-4881-a5f3-2f7cbae24198", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -11426,7 +11466,7 @@ ] }, { - "uuid": "4cba63fd-a7e0-4820-8ab7-b2bd846e0563", + "uuid": "e64e07a7-533f-42ff-9b6f-e100db0e8956", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -11453,7 +11493,7 @@ ] }, { - "uuid": "35ed3585-2de4-48f7-9f79-70c79191ceb6", + "uuid": "969213a0-5079-4489-abe9-d3aea97dd8dc", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -11465,7 +11505,7 @@ ] }, { - "uuid": "13477964-0659-431e-93aa-0a66c66431a3", + "uuid": "a74030ad-ae36-4e4b-91f8-d438a132e887", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -11482,7 +11522,7 @@ ] }, { - "uuid": "aa9bf24e-3f06-42e0-9e9e-50c7da3b634d", + "uuid": "83c26791-9399-4903-8538-f5a19df7cda6", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -11499,7 +11539,7 @@ ] }, { - "uuid": "b4f9bed0-858b-4536-b39a-00b30d64b385", + "uuid": "2cabda5b-a823-4a99-9c7c-dc4f6ddcc225", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11516,7 +11556,7 @@ ] }, { - "uuid": "ca85115f-d844-4c91-8d89-de73df978570", + "uuid": "f9e3e967-794a-41c3-a427-0f10f80c3fd8", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -11533,7 +11573,7 @@ ] }, { - "uuid": "1183da1b-96cd-4a91-91ef-15b454957079", + "uuid": "6d07e62b-394f-467c-a525-e2237cd90fac", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -11550,7 +11590,7 @@ ] }, { - "uuid": "112be996-07f0-4ccc-a4b5-bf6d79428cfa", + "uuid": "f896c4d9-a521-4ad9-b8b7-aa8754b42ef9", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -11567,7 +11607,7 @@ ] }, { - "uuid": "d26456ea-a1bb-4f24-860d-491e71f944fa", + "uuid": "2296e864-152b-40ff-95be-f607b0a0849c", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -11584,7 +11624,7 @@ ] }, { - "uuid": "1e42c69e-8f6a-4953-8a45-6b9f00254d7f", + "uuid": "102a1052-641c-4d7f-a236-cf6ac5658e8f", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -11601,7 +11641,7 @@ ] }, { - "uuid": "2f82868e-d2b1-4a39-9d17-ca8d74fb14b1", + "uuid": "f8feeb73-0072-4722-935f-c2239ccaf551", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -11618,7 +11658,7 @@ ] }, { - "uuid": "d2258e91-4077-406a-891d-e1a37dd7e0d7", + "uuid": "ff67bafa-3ed8-4618-831d-bf297a880b94", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -11635,7 +11675,7 @@ ] }, { - "uuid": "01b5dc7a-aaa6-44c2-af6e-ffa779a28d92", + "uuid": "4048cbd3-abca-4890-9663-a168f5765710", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11657,7 +11697,7 @@ ] }, { - "uuid": "944b88ec-8308-4e18-a9ae-3240a1353d40", + "uuid": "dd9fd287-2b6e-4392-a139-fa6b9643aee5", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -11670,7 +11710,7 @@ ] }, { - "uuid": "5394ac70-4523-459f-929a-a3e0461ba4d9", + "uuid": "7c5e9eac-1a09-460a-9447-86700ae9d036", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11687,7 +11727,7 @@ ] }, { - "uuid": "a17130f5-0b66-4b66-8d4e-248fd3fb878c", + "uuid": "2fc79e13-0803-469c-a30f-342bfdd56bbe", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -11704,7 +11744,7 @@ ] }, { - "uuid": "f40fc025-9f52-47c2-984c-b8ef38f48850", + "uuid": "f1b8517c-da78-422b-a03e-c893773816dc", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11721,7 +11761,7 @@ ] }, { - "uuid": "699bcfec-38c9-479f-ad7b-99ace598015f", + "uuid": "4b78fa21-8342-42ff-8d6d-bffca463dcbb", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11743,7 +11783,7 @@ ] }, { - "uuid": "c4a314b9-b4ec-43ee-9024-3752259bf0ba", + "uuid": "8ffce943-b4cf-4b49-aee9-6b0e0716aa83", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -11760,7 +11800,7 @@ ] }, { - "uuid": "5d3d2c77-286e-4ca6-ab21-5f9f00ab3983", + "uuid": "06aa2c59-c0c1-49d7-9d4d-ad5583b8e1bf", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11782,7 +11822,7 @@ ] }, { - "uuid": "eecbefce-3870-4b50-a9df-f70456a82538", + "uuid": "d08c1582-9b29-4ac6-adcb-aa1e6877edc0", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11804,7 +11844,7 @@ ] }, { - "uuid": "d4057788-92fb-4e05-af5e-7414ef8a33eb", + "uuid": "5cdf1489-8a2b-45d6-923b-f1cf58b2bd83", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -11821,7 +11861,7 @@ ] }, { - "uuid": "d4b8270b-40dd-4c6f-85d1-e7682495e53e", + "uuid": "4fef4a1e-6ddf-4f8d-aacd-6483168f7228", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11843,7 +11883,7 @@ ] }, { - "uuid": "c1d8758d-5b0d-45b1-876b-373661729ba6", + "uuid": "d8429dc3-7642-43ae-9e69-f000ebe8a81d", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11860,7 +11900,7 @@ ] }, { - "uuid": "e4f90640-1de4-4057-b5b9-5f85c57da4c6", + "uuid": "e443fe65-f2de-4962-be64-9e9147a8ef6a", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11877,7 +11917,7 @@ ] }, { - "uuid": "b6d8fc16-6299-4328-b752-9b2f7333fdde", + "uuid": "aaefbfdb-94c9-4141-946c-04a73284b44a", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11894,7 +11934,7 @@ ] }, { - "uuid": "53a5ad48-ae4c-46d9-a252-d00b54fad3db", + "uuid": "5a5bbcad-cd58-4032-b6a2-f18e722ec3bf", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11911,7 +11951,7 @@ ] }, { - "uuid": "5c3508fb-c911-4e3d-ae9a-ade53e5ed38c", + "uuid": "80cee14c-de1a-4112-92ba-fa510cf149bd", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -11928,7 +11968,7 @@ ] }, { - "uuid": "4462a11c-7fc7-463b-8c5b-f182ed02965e", + "uuid": "624cac11-e2aa-4bb4-a3d9-b5caafe52c8d", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -11950,7 +11990,7 @@ ] }, { - "uuid": "934334e5-2302-465c-8580-eb967d4cff36", + "uuid": "8e7ae78b-951f-4ebc-a3e0-28deeeccdbfe", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -11967,7 +12007,7 @@ ] }, { - "uuid": "ebf34857-9163-4ae4-be7f-36acb0bdb9ef", + "uuid": "c4cf2aa0-5d31-4002-af46-460de66324ef", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -11989,7 +12029,7 @@ ] }, { - "uuid": "19a5d3b5-4f22-4fdf-8454-ade62aa09fe4", + "uuid": "e515a3e5-fc63-4739-9477-14c422ec307f", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -12006,7 +12046,7 @@ ] }, { - "uuid": "971937f7-4aea-43b2-a578-5c4fbd2376ab", + "uuid": "9852767b-49c2-438c-a05a-f137d0bc39e5", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12023,7 +12063,7 @@ ] }, { - "uuid": "393326c3-07d7-4aea-a703-56d53bb4c431", + "uuid": "a97954ed-e86d-4898-bd63-eed96f53269a", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12050,7 +12090,7 @@ ] }, { - "uuid": "4831aba2-88ab-4446-86a2-0e87e5a6903c", + "uuid": "2b641e36-7e3f-4210-adf9-6fb8b3203b93", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12072,7 +12112,7 @@ ] }, { - "uuid": "a49662b9-97e5-47e4-9566-ecf9a6f20eed", + "uuid": "8250ea0c-7ad9-411f-b2ff-ea426d22e045", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12089,7 +12129,7 @@ ] }, { - "uuid": "2cc7b586-dd09-4ed1-9dd4-714c0edeac1c", + "uuid": "c80e8269-ed85-4a30-8503-581a62b6e5bf", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12106,7 +12146,7 @@ ] }, { - "uuid": "9ae67d37-e6f6-4457-b2b5-1dd6a9f2b50b", + "uuid": "27ab21b0-e893-4897-b953-76826962b8e4", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12123,7 +12163,7 @@ ] }, { - "uuid": "7fa98ccb-9b60-4440-acab-722a3f91dbe6", + "uuid": "47dd95ef-ff6e-4aba-b275-c42c19b24ad0", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -12136,7 +12176,7 @@ ] }, { - "uuid": "81a6f2f2-f07c-47fc-8739-63fe34606d23", + "uuid": "66012a23-3bbb-4952-9ed6-cd02bd2a02e7", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -12149,7 +12189,7 @@ ] }, { - "uuid": "7dc5b714-16bf-460b-9710-a09f1bb59c55", + "uuid": "860fd5c9-f1c6-4331-a34d-06b59fc8f3d5", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12166,7 +12206,7 @@ ] }, { - "uuid": "630d5830-63f7-44e0-9519-04deef1e91c6", + "uuid": "429b6a29-7abe-4e77-8706-1a194da51694", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12183,7 +12223,7 @@ ] }, { - "uuid": "36815c5d-140f-4641-aa6b-025f2cb0a203", + "uuid": "cc5e3fcd-3423-4880-9bae-03ebe3489b5a", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -12196,7 +12236,7 @@ ] }, { - "uuid": "2f6d2616-b543-4031-972e-3ce14e92e805", + "uuid": "dd7d18d2-996f-4b79-919f-1ae9c8d0a2c5", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12213,7 +12253,7 @@ ] }, { - "uuid": "ed7f8c45-d62c-44a7-a626-923e3486b17e", + "uuid": "f759070a-9f56-4dbb-a55c-7ef77b02e490", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12230,7 +12270,7 @@ ] }, { - "uuid": "1bb96083-e6fb-4a25-98a4-506efdb91e61", + "uuid": "e6b861f3-8458-4edc-8a4d-a479846a05b3", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12247,7 +12287,7 @@ ] }, { - "uuid": "6632d417-f95b-4cb4-8ed0-2afcfeca9fa4", + "uuid": "998b016d-7f51-4c3e-8c36-f73d9ca7b1a4", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12264,7 +12304,7 @@ ] }, { - "uuid": "20553a6a-059d-42c0-9531-ac56bab63798", + "uuid": "74764590-e147-4da8-a89a-b7be13001fc3", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12281,7 +12321,7 @@ ] }, { - "uuid": "2d7ece9c-9bf1-45ad-9556-d89aa2c10420", + "uuid": "035b56fb-6697-4722-b99e-589016fc8466", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -12293,7 +12333,7 @@ ] }, { - "uuid": "ad29faec-c675-48f2-a9f4-1a1c4e13a881", + "uuid": "59f55084-0aec-4da8-a317-f9616948b2cd", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -12305,7 +12345,7 @@ ] }, { - "uuid": "5979e84f-4b7a-4533-af43-91f2e1f7e88f", + "uuid": "78c15986-c7fd-41b8-87fb-fef30c170a30", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -12317,7 +12357,7 @@ ] }, { - "uuid": "1372df15-9e85-4c50-b28e-71d75c3927f2", + "uuid": "355645b5-ea75-45b2-8cfb-3c731bd6f248", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -12329,7 +12369,7 @@ ] }, { - "uuid": "69c8ca86-c36d-4c0e-bbce-a9aaf32cddef", + "uuid": "8f25b636-7186-4f4f-aec2-b4892738c1ab", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -12342,7 +12382,7 @@ ] }, { - "uuid": "8503e1b4-26d4-45a9-a86b-cee03121e13e", + "uuid": "6f61a195-3030-42ba-9a93-9933d3dd280b", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -12355,7 +12395,7 @@ ] }, { - "uuid": "ee3714af-6ca3-4ca9-8fce-84e5d6f7495a", + "uuid": "8c34c0a8-b6f6-4e33-b507-adca69575a29", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -12367,7 +12407,7 @@ ] }, { - "uuid": "40deefdc-b1d3-4741-917f-c2804f819712", + "uuid": "66a09c72-988f-4774-9c94-86eedfe74385", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -12380,7 +12420,7 @@ ] }, { - "uuid": "d8422fff-2370-4174-ba30-a06c8674272e", + "uuid": "bb99e0fa-4d2f-4490-a1c1-3f5a38100941", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12407,7 +12447,7 @@ ] }, { - "uuid": "41a18455-5751-4dc6-b3b7-06083a210f20", + "uuid": "6d81fb09-82d4-4601-800b-f56b6c19454e", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12434,7 +12474,7 @@ ] }, { - "uuid": "70f8be1d-674c-48d8-8b63-0c2119c7972b", + "uuid": "1dd58e4e-a7ed-4bf5-a2e4-effdcc09cb67", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12461,7 +12501,7 @@ ] }, { - "uuid": "302836d7-95e3-4d91-9ae2-ff35c6c0077d", + "uuid": "ea22f16d-1306-49b0-8359-659857451277", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12488,7 +12528,7 @@ ] }, { - "uuid": "d5b24622-9b5d-437d-8074-fff68add0567", + "uuid": "4cabfc31-dd76-41dc-a0fe-ffabfae7d29d", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12515,7 +12555,7 @@ ] }, { - "uuid": "b4b222a9-3c14-4e5e-a159-8941862e5244", + "uuid": "ff7acad5-ffd5-4dc9-a31e-2be98558660f", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12542,7 +12582,7 @@ ] }, { - "uuid": "4fc1dfb5-f0f4-4bdf-8c5d-3751801c184d", + "uuid": "4dbcf8e8-257b-431f-a399-f362fc7314b7", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12569,7 +12609,7 @@ ] }, { - "uuid": "416b4bf5-7af5-47f0-8b33-ae3c98b0aa2e", + "uuid": "436fd9db-9a4f-434d-9607-7e3064e4c435", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12596,7 +12636,7 @@ ] }, { - "uuid": "f2fafb06-f2e6-48af-b3b3-ce52cda2634c", + "uuid": "192d4fa1-66f0-4576-9ed6-df839d1a9738", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12623,7 +12663,7 @@ ] }, { - "uuid": "10bf749b-9fc9-4973-ab5e-199e555e348a", + "uuid": "61d11688-aa1d-403b-8488-4d2df5d1bf91", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12650,7 +12690,7 @@ ] }, { - "uuid": "313816c0-25c1-4f1d-9f60-89d619d2c6bc", + "uuid": "14f1b788-0148-4830-ab5d-2bf82aa7c23c", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12692,7 +12732,7 @@ ] }, { - "uuid": "fcab9f8a-bdeb-4b88-9aee-be7dda4bc883", + "uuid": "30d7af3a-b1cd-4d6f-8e20-f0b513e3497a", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12714,7 +12754,7 @@ ] }, { - "uuid": "e7247697-8354-4be8-a382-8ae7776ea697", + "uuid": "f29bfd65-5b29-445d-9fbc-c96721b49d06", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12736,7 +12776,7 @@ ] }, { - "uuid": "ffddb752-6c00-4e0b-be25-104780395d3f", + "uuid": "f5050a9c-e81c-41a3-acc4-e9a953036054", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -12749,7 +12789,7 @@ ] }, { - "uuid": "e5576348-3f7c-4bf1-9dcb-9a3b1510418e", + "uuid": "1825b02b-59c3-448c-9831-5110e9d4fee2", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12766,7 +12806,7 @@ ] }, { - "uuid": "7165255f-42da-47c7-aa42-91ca09f4daf9", + "uuid": "b5584dca-3d8b-4d74-bd7c-fdbbaae94e45", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12783,7 +12823,7 @@ ] }, { - "uuid": "da75801c-6f86-4005-9652-bec013abcd9b", + "uuid": "8747cd39-8049-4f4c-ad90-c608870e30ef", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12800,7 +12840,7 @@ ] }, { - "uuid": "54a13d86-6953-4860-a1e6-76128bf63390", + "uuid": "f1c34088-d33e-4a7b-a2dc-2213dc24c95a", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12817,7 +12857,7 @@ ] }, { - "uuid": "5e0464b1-5ea9-4d0b-a075-e3670ec26789", + "uuid": "ffe12478-0818-43bd-b4c2-8a69e118e4de", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12834,7 +12874,7 @@ ] }, { - "uuid": "ce164b91-963f-456f-99b5-328afb03f3bd", + "uuid": "1ead6f17-8dfe-41b4-8f16-2a1ea5d9cf27", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12851,7 +12891,7 @@ ] }, { - "uuid": "31c62252-8187-42fd-82c7-1e7b522a8f02", + "uuid": "7bb6194f-c4b2-47cf-a05f-96ef7551e67a", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12868,7 +12908,7 @@ ] }, { - "uuid": "004e01e0-e183-4d77-b365-3b2bd1756ee3", + "uuid": "4b668020-115d-4ec1-b709-8f95039ef9ed", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12895,7 +12935,7 @@ ] }, { - "uuid": "df7e5bad-b9ec-4609-9b4c-6234bcdb600a", + "uuid": "722f769d-382d-4ce8-a53d-eb0a7c549f8d", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -12996,103 +13036,103 @@ { "name": "Parameter_Id_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "inactivity_timeout_value", + "value": "dconf_login_banner_contents", "remarks": "rule_set_000" }, { "name": "Parameter_Description_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Choose allowed duration (in seconds) of inactive graphical sessions", + "value": "Enter an appropriate login banner text for your organization. This variable is used only in remediations. In OVAL checks a regular expression specified in the login_banner_text variable is used instead. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_1", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", + "value": "{'default': 'Authorized users only. All activity may be monitored and reported.', 'cis_default': 'Authorized uses only. All activity may be monitored and reported.', 'dod_default': 'You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions:\\\\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\\\\n-At any time, the USG may inspect and seize data stored on this IS.\\\\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\\\\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\\\\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.', 'dod_short': \"I've read & consent to terms in IS user agreem't.\", 'dss_odaa_default': 'Use of this or any other DoD interest computer system constitutes consent to monitoring at all times. This is a DoD interest computer system. All DoD interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other DoD interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of DoD interest computer systems are subject to appropriate disciplinary action. Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.', 'usgcb_default': '-- WARNING -- This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity system personal may provide the evidence of such monitoring to law enforcement officials.'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "login_banner_text", + "value": "dconf_login_banner_text", "remarks": "rule_set_000" }, { "name": "Parameter_Description_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\\n' character and special characters like parentheses and quotation marks must be escaped with '\\\\'.", + "value": "Enter an appropriate login banner regular expression for your organization. Using a regular expression is needed because some profiles (eg. STIG) allow multiple different banners. This regular expression is used only in OVAL checks. In remediations the login_banner_contents variable is used instead. For information about how to generate banner regular expression for your tailoring files, see: https://complianceascode.readthedocs.io/en/latest/manual/developer/05_tools_and_utilities.html#generating-login-banner-regular-expressions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_2", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", + "value": "{'cis_banners': '^(Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.|^(?!.*(\\\\\\\\|fedora|rhel|sle|ubuntu)).*)$', 'cis_default': '^Authorized[\\\\s\\\\n]+uses[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$', 'dod_banners': \"^(You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.|I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.)$\", 'dod_default': '^You[\\\\s\\\\n]+are[\\\\s\\\\n]+accessing[\\\\s\\\\n]+a[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+\\\\(USG\\\\)[\\\\s\\\\n]+Information[\\\\s\\\\n]+System[\\\\s\\\\n]+\\\\(IS\\\\)[\\\\s\\\\n]+that[\\\\s\\\\n]+is[\\\\s\\\\n]+provided[\\\\s\\\\n]+for[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+use[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+By[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+\\\\(which[\\\\s\\\\n]+includes[\\\\s\\\\n]+any[\\\\s\\\\n]+device[\\\\s\\\\n]+attached[\\\\s\\\\n]+to[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\),[\\\\s\\\\n]+you[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+the[\\\\s\\\\n]+following[\\\\s\\\\n]+conditions\\\\:(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-The[\\\\s\\\\n]+USG[\\\\s\\\\n]+routinely[\\\\s\\\\n]+intercepts[\\\\s\\\\n]+and[\\\\s\\\\n]+monitors[\\\\s\\\\n]+communications[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+for[\\\\s\\\\n]+purposes[\\\\s\\\\n]+including,[\\\\s\\\\n]+but[\\\\s\\\\n]+not[\\\\s\\\\n]+limited[\\\\s\\\\n]+to,[\\\\s\\\\n]+penetration[\\\\s\\\\n]+testing,[\\\\s\\\\n]+COMSEC[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+network[\\\\s\\\\n]+operations[\\\\s\\\\n]+and[\\\\s\\\\n]+defense,[\\\\s\\\\n]+personnel[\\\\s\\\\n]+misconduct[\\\\s\\\\n]+\\\\(PM\\\\),[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+\\\\(LE\\\\),[\\\\s\\\\n]+and[\\\\s\\\\n]+counterintelligence[\\\\s\\\\n]+\\\\(CI\\\\)[\\\\s\\\\n]+investigations\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-At[\\\\s\\\\n]+any[\\\\s\\\\n]+time,[\\\\s\\\\n]+the[\\\\s\\\\n]+USG[\\\\s\\\\n]+may[\\\\s\\\\n]+inspect[\\\\s\\\\n]+and[\\\\s\\\\n]+seize[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+IS\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Communications[\\\\s\\\\n]+using,[\\\\s\\\\n]+or[\\\\s\\\\n]+data[\\\\s\\\\n]+stored[\\\\s\\\\n]+on,[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+are[\\\\s\\\\n]+not[\\\\s\\\\n]+private,[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+routine[\\\\s\\\\n]+monitoring,[\\\\s\\\\n]+interception,[\\\\s\\\\n]+and[\\\\s\\\\n]+search,[\\\\s\\\\n]+and[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+disclosed[\\\\s\\\\n]+or[\\\\s\\\\n]+used[\\\\s\\\\n]+for[\\\\s\\\\n]+any[\\\\s\\\\n]+USG\\\\-authorized[\\\\s\\\\n]+purpose\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-This[\\\\s\\\\n]+IS[\\\\s\\\\n]+includes[\\\\s\\\\n]+security[\\\\s\\\\n]+measures[\\\\s\\\\n]+\\\\(e\\\\.g\\\\.,[\\\\s\\\\n]+authentication[\\\\s\\\\n]+and[\\\\s\\\\n]+access[\\\\s\\\\n]+controls\\\\)[\\\\s\\\\n]+to[\\\\s\\\\n]+protect[\\\\s\\\\n]+USG[\\\\s\\\\n]+interests\\\\-\\\\-not[\\\\s\\\\n]+for[\\\\s\\\\n]+your[\\\\s\\\\n]+personal[\\\\s\\\\n]+benefit[\\\\s\\\\n]+or[\\\\s\\\\n]+privacy\\\\.(?:[\\\\n]+|(?:\\\\\\\\n)+)\\\\-Notwithstanding[\\\\s\\\\n]+the[\\\\s\\\\n]+above,[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+IS[\\\\s\\\\n]+does[\\\\s\\\\n]+not[\\\\s\\\\n]+constitute[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+PM,[\\\\s\\\\n]+LE[\\\\s\\\\n]+or[\\\\s\\\\n]+CI[\\\\s\\\\n]+investigative[\\\\s\\\\n]+searching[\\\\s\\\\n]+or[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+the[\\\\s\\\\n]+content[\\\\s\\\\n]+of[\\\\s\\\\n]+privileged[\\\\s\\\\n]+communications,[\\\\s\\\\n]+or[\\\\s\\\\n]+work[\\\\s\\\\n]+product,[\\\\s\\\\n]+related[\\\\s\\\\n]+to[\\\\s\\\\n]+personal[\\\\s\\\\n]+representation[\\\\s\\\\n]+or[\\\\s\\\\n]+services[\\\\s\\\\n]+by[\\\\s\\\\n]+attorneys,[\\\\s\\\\n]+psychotherapists,[\\\\s\\\\n]+or[\\\\s\\\\n]+clergy,[\\\\s\\\\n]+and[\\\\s\\\\n]+their[\\\\s\\\\n]+assistants\\\\.[\\\\s\\\\n]+Such[\\\\s\\\\n]+communications[\\\\s\\\\n]+and[\\\\s\\\\n]+work[\\\\s\\\\n]+product[\\\\s\\\\n]+are[\\\\s\\\\n]+private[\\\\s\\\\n]+and[\\\\s\\\\n]+confidential\\\\.[\\\\s\\\\n]+See[\\\\s\\\\n]+User[\\\\s\\\\n]+Agreement[\\\\s\\\\n]+for[\\\\s\\\\n]+details\\\\.$', 'dod_short': \"^I've[\\\\s\\\\n]+read[\\\\s\\\\n]+\\\\&[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+terms[\\\\s\\\\n]+in[\\\\s\\\\n]+IS[\\\\s\\\\n]+user[\\\\s\\\\n]+agreem't\\\\.$\", 'dss_odaa_default': '^Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.[\\\\s\\\\n]+This[\\\\s\\\\n]+is[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+and[\\\\s\\\\n]+related[\\\\s\\\\n]+equipment[\\\\s\\\\n]+are[\\\\s\\\\n]+intended[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+communication,[\\\\s\\\\n]+transmission,[\\\\s\\\\n]+processing,[\\\\s\\\\n]+and[\\\\s\\\\n]+storage[\\\\s\\\\n]+of[\\\\s\\\\n]+official[\\\\s\\\\n]+U\\\\.S\\\\.[\\\\s\\\\n]+Government[\\\\s\\\\n]+or[\\\\s\\\\n]+other[\\\\s\\\\n]+authorized[\\\\s\\\\n]+information[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times[\\\\s\\\\n]+to[\\\\s\\\\n]+ensure[\\\\s\\\\n]+proper[\\\\s\\\\n]+functioning[\\\\s\\\\n]+of[\\\\s\\\\n]+equipment[\\\\s\\\\n]+and[\\\\s\\\\n]+systems[\\\\s\\\\n]+including[\\\\s\\\\n]+security[\\\\s\\\\n]+devices[\\\\s\\\\n]+and[\\\\s\\\\n]+systems,[\\\\s\\\\n]+to[\\\\s\\\\n]+prevent[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+and[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+statutes[\\\\s\\\\n]+and[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations,[\\\\s\\\\n]+to[\\\\s\\\\n]+deter[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity,[\\\\s\\\\n]+and[\\\\s\\\\n]+for[\\\\s\\\\n]+other[\\\\s\\\\n]+similar[\\\\s\\\\n]+purposes\\\\.[\\\\s\\\\n]+Any[\\\\s\\\\n]+user[\\\\s\\\\n]+of[\\\\s\\\\n]+a[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+should[\\\\s\\\\n]+be[\\\\s\\\\n]+aware[\\\\s\\\\n]+that[\\\\s\\\\n]+any[\\\\s\\\\n]+information[\\\\s\\\\n]+placed[\\\\s\\\\n]+in[\\\\s\\\\n]+the[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+not[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+any[\\\\s\\\\n]+expectation[\\\\s\\\\n]+of[\\\\s\\\\n]+privacy\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+violation[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+statutes,[\\\\s\\\\n]+this[\\\\s\\\\n]+evidence[\\\\s\\\\n]+and[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+related[\\\\s\\\\n]+information,[\\\\s\\\\n]+including[\\\\s\\\\n]+identification[\\\\s\\\\n]+information[\\\\s\\\\n]+about[\\\\s\\\\n]+the[\\\\s\\\\n]+user,[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+provided[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.[\\\\s\\\\n]+If[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+reveals[\\\\s\\\\n]+violations[\\\\s\\\\n]+of[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use,[\\\\s\\\\n]+employees[\\\\s\\\\n]+who[\\\\s\\\\n]+violate[\\\\s\\\\n]+security[\\\\s\\\\n]+regulations[\\\\s\\\\n]+or[\\\\s\\\\n]+make[\\\\s\\\\n]+unauthorized[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+systems[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+appropriate[\\\\s\\\\n]+disciplinary[\\\\s\\\\n]+action\\\\.[\\\\s\\\\n]+Use[\\\\s\\\\n]+of[\\\\s\\\\n]+this[\\\\s\\\\n]+or[\\\\s\\\\n]+any[\\\\s\\\\n]+other[\\\\s\\\\n]+DoD[\\\\s\\\\n]+interest[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+constitutes[\\\\s\\\\n]+consent[\\\\s\\\\n]+to[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+at[\\\\s\\\\n]+all[\\\\s\\\\n]+times\\\\.$', 'usgcb_default': '^\\\\-\\\\-[\\\\s\\\\n]+WARNING[\\\\s\\\\n]+\\\\-\\\\-[\\\\s\\\\n]+This[\\\\s\\\\n]+system[\\\\s\\\\n]+is[\\\\s\\\\n]+for[\\\\s\\\\n]+the[\\\\s\\\\n]+use[\\\\s\\\\n]+of[\\\\s\\\\n]+authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+Individuals[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+computer[\\\\s\\\\n]+system[\\\\s\\\\n]+without[\\\\s\\\\n]+authority[\\\\s\\\\n]+or[\\\\s\\\\n]+in[\\\\s\\\\n]+excess[\\\\s\\\\n]+of[\\\\s\\\\n]+their[\\\\s\\\\n]+authority[\\\\s\\\\n]+are[\\\\s\\\\n]+subject[\\\\s\\\\n]+to[\\\\s\\\\n]+having[\\\\s\\\\n]+all[\\\\s\\\\n]+their[\\\\s\\\\n]+activities[\\\\s\\\\n]+on[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+recorded[\\\\s\\\\n]+by[\\\\s\\\\n]+system[\\\\s\\\\n]+personnel\\\\.[\\\\s\\\\n]+Anyone[\\\\s\\\\n]+using[\\\\s\\\\n]+this[\\\\s\\\\n]+system[\\\\s\\\\n]+expressly[\\\\s\\\\n]+consents[\\\\s\\\\n]+to[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+and[\\\\s\\\\n]+is[\\\\s\\\\n]+advised[\\\\s\\\\n]+that[\\\\s\\\\n]+if[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+reveals[\\\\s\\\\n]+possible[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+criminal[\\\\s\\\\n]+activity[\\\\s\\\\n]+system[\\\\s\\\\n]+personal[\\\\s\\\\n]+may[\\\\s\\\\n]+provide[\\\\s\\\\n]+the[\\\\s\\\\n]+evidence[\\\\s\\\\n]+of[\\\\s\\\\n]+such[\\\\s\\\\n]+monitoring[\\\\s\\\\n]+to[\\\\s\\\\n]+law[\\\\s\\\\n]+enforcement[\\\\s\\\\n]+officials\\\\.$', 'default': '^Authorized[\\\\s\\\\n]+users[\\\\s\\\\n]+only\\\\.[\\\\s\\\\n]+All[\\\\s\\\\n]+activity[\\\\s\\\\n]+may[\\\\s\\\\n]+be[\\\\s\\\\n]+monitored[\\\\s\\\\n]+and[\\\\s\\\\n]+reported\\\\.$'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_idle_timeout_value", + "value": "inactivity_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify duration of allowed idle time.", + "value": "Choose allowed duration (in seconds) of inactive graphical sessions", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_3", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", + "value": "{'10_minutes': 600, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, 'default': 900}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_max_auth_tries_value", + "value": "sshd_idle_timeout_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the maximum number of authentication attempts per connection.", + "value": "Specify duration of allowed idle time.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_4", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", + "value": "{'10_minutes': 600, '120_minutes': 7200, '14_minutes': 840, '15_minutes': 900, '30_minutes': 1800, '5_minutes': 300, '60_minutes': 3600, 'default': 300}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", + "value": "sshd_max_auth_tries_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance", + "value": "Specify the maximum number of authentication attempts per connection.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_5", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 'default': 4}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Disable ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -13104,67 +13144,67 @@ { "name": "Parameter_Id_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians_value", + "value": "sysctl_net_ipv4_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter_value", + "value": "sysctl_net_ipv4_conf_all_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'enabled': 1, 'loose': 2}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_all_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", + "value": "Enable to enforce sanity checking, also called ingress filtering or egress filtering. The point is to drop a packet if the source and destination IP addresses in the IP header do not make sense when considered in light of the physical interface on which it arrived.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_9", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'enabled': 1, 'loose': 2}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv4_conf_all_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_10", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ICMP Redirect Acceptance?", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packets on all interfaces.", "remarks": "rule_set_000" }, { @@ -13176,13 +13216,13 @@ { "name": "Parameter_Id_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv4_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_11", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IP source routing?", + "value": "Disable ICMP Redirect Acceptance?", "remarks": "rule_set_000" }, { @@ -13194,13 +13234,13 @@ { "name": "Parameter_Id_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding_value", + "value": "sysctl_net_ipv4_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_12", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv4 Forwarding", + "value": "Disable IP source routing?", "remarks": "rule_set_000" }, { @@ -13212,31 +13252,31 @@ { "name": "Parameter_Id_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians_value", + "value": "sysctl_net_ipv4_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", + "value": "Toggle IPv4 Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_13", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter_value", + "value": "sysctl_net_ipv4_conf_default_log_martians_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_14", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enables source route verification", + "value": "Disable so you don't Log Spoofed Packets, Source Routed Packets, Redirect Packets", "remarks": "rule_set_000" }, { @@ -13248,49 +13288,49 @@ { "name": "Parameter_Id_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", + "value": "sysctl_net_ipv4_conf_default_rp_filter_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", + "value": "Enables source route verification", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", + "value": "sysctl_net_ipv4_conf_default_secure_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", + "value": "Enable to prevent hijacking of routing path by only allowing redirects from gateways known in routing table. Disable to refuse acceptance of secure ICMP redirected packages by default.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to prevent unnecessary logging", + "value": "Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast", "remarks": "rule_set_000" }, { @@ -13302,13 +13342,13 @@ { "name": "Parameter_Id_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies_value", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable to turn on TCP SYN Cookie Protection", + "value": "Enable to prevent unnecessary logging", "remarks": "rule_set_000" }, { @@ -13320,31 +13360,31 @@ { "name": "Parameter_Id_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_value", + "value": "sysctl_net_ipv4_tcp_syncookies_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept all router advertisements?", + "value": "Enable to turn on TCP SYN Cookie Protection", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", + "value": "{'default': 1, 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_all_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance", + "value": "Accept all router advertisements?", "remarks": "rule_set_000" }, { @@ -13356,13 +13396,13 @@ { "name": "Parameter_Id_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_all_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_21", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance", "remarks": "rule_set_000" }, { @@ -13374,13 +13414,13 @@ { "name": "Parameter_Id_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding_value", + "value": "sysctl_net_ipv6_conf_all_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_22", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -13392,13 +13432,13 @@ { "name": "Parameter_Id_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_value", + "value": "sysctl_net_ipv6_conf_all_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_23", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Accept default router advertisements by default?", + "value": "Toggle IPv6 Forwarding", "remarks": "rule_set_000" }, { @@ -13410,13 +13450,13 @@ { "name": "Parameter_Id_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", + "value": "sysctl_net_ipv6_conf_default_accept_ra_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle ICMP Redirect Acceptance By Default", + "value": "Accept default router advertisements by default?", "remarks": "rule_set_000" }, { @@ -13428,13 +13468,13 @@ { "name": "Parameter_Id_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", + "value": "sysctl_net_ipv6_conf_default_accept_redirects_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", + "value": "Toggle ICMP Redirect Acceptance By Default", "remarks": "rule_set_000" }, { @@ -13446,13 +13486,13 @@ { "name": "Parameter_Id_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding_value", + "value": "sysctl_net_ipv6_conf_default_accept_source_route_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Toggle IPv6 default Forwarding", + "value": "Trackers could be using source-routed packets to generate traffic that seems to be intra-net, but actually was created outside and has been redirected.", "remarks": "rule_set_000" }, { @@ -13464,427 +13504,427 @@ { "name": "Parameter_Id_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_account_disable_post_pw_expiration", + "value": "sysctl_net_ipv6_conf_default_forwarding_value", "remarks": "rule_set_000" }, { "name": "Parameter_Description_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", + "value": "Toggle IPv6 default Forwarding", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_27", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", + "value": "{'default': '0', 'disabled': '0', 'enabled': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_maximum_age_login_defs", + "value": "var_account_disable_post_pw_expiration", "remarks": "rule_set_000" }, { "name": "Parameter_Description_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum age of password in days", + "value": "The number of days to wait after a password expires, until the account will be permanently disabled.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_28", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", + "value": "{'0': '0', 180: 180, 30: 30, 35: 35, 40: 40, 45: 45, 60: 60, 90: 90, 'default': 35}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_minimum_age_login_defs", + "value": "var_accounts_maximum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum age of password in days", + "value": "Maximum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", + "value": "{365: 365, 120: 120, 180: 180, 90: 90, 60: 60, 45: 45, 'default': 60}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_password_warn_age_login_defs", + "value": "var_accounts_minimum_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The number of days' warning given before a password expires.", + "value": "Minimum age of password in days", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_30", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_deny", + "value": "var_accounts_password_warn_age_login_defs", "remarks": "rule_set_000" }, { "name": "Parameter_Description_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Number of failed login attempts before account lockout", + "value": "The number of days' warning given before a password expires.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_31", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", + "value": "{'0': '0', 14: 14, 10: 10, 7: 7, 'default': 7}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_dir", + "value": "var_accounts_passwords_pam_faillock_deny", "remarks": "rule_set_000" }, { "name": "Parameter_Description_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The directory where the user files with the failure records are kept", + "value": "Number of failed login attempts before account lockout", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_32", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", + "value": "{10: 10, 3: 3, 4: 4, 5: 5, 6: 6, 8: 8, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_passwords_pam_faillock_unlock_time", + "value": "var_accounts_passwords_pam_faillock_dir", "remarks": "rule_set_000" }, { "name": "Parameter_Description_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", + "value": "The directory where the user files with the failure records are kept", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_33", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", + "value": "{'ol8': '/var/log/faillock', 'default': '/var/log/faillock', 'run': '/var/run/faillock'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_tmout", + "value": "var_accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_000" }, { "name": "Parameter_Description_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", + "value": "Seconds before automatic unlocking or permanently locking after excessive failed logins", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_34", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", + "value": "{1800: 1800, 3600: 3600, 600: 600, 604800: 604800, 86400: 86400, 900: 900, 300: 300, 'default': 0, 'never': 0}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_accounts_user_umask", + "value": "var_accounts_tmout", "remarks": "rule_set_000" }, { "name": "Parameter_Description_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enter default user umask", + "value": "In an interactive shell, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_35", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", + "value": "{'30_min': 1800, '10_min': 600, '15_min': 900, '5_min': 300, 'default': 600}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_audit_backlog_limit", + "value": "var_accounts_user_umask", "remarks": "rule_set_000" }, { "name": "Parameter_Description_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", + "value": "Enter default user umask", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 8192, 8192: 8192}", + "value": "{'007': '007', '022': '022', '027': '027', '077': '077', 'default': '027'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_admin_space_left_action", + "value": "var_audit_backlog_limit", "remarks": "rule_set_000" }, { "name": "Parameter_Description_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", + "value": "Value of the audit_backlog_limit argument in GRUB 2 configuration. The audit_backlog_limit parameter determines how auditd records can be held in the auditd backlog.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", + "value": "{'default': 8192, 8192: 8192}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_error_action", + "value": "var_auditd_admin_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "The setting for admin_space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", + "value": "{'default': 'single', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'single|halt', 'cis_rhel10': 'single|halt', 'cis_fedora': 'single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_disk_full_action", + "value": "var_auditd_disk_error_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", + "value": "'The setting for disk_error_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'syslog|single|halt', 'cis_rhel9': 'syslog|single|halt', 'cis_rhel10': 'syslog|single|halt', 'cis_fedora': 'syslog|single|halt', 'cis_ubuntu2204': 'syslog|single|halt', 'cis_ubuntu2404': 'syslog|single|halt', 'cis_debian12': 'syslog|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file", + "value": "var_auditd_disk_full_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file in /etc/audit/auditd.conf", + "value": "'The setting for disk_full_action in /etc/audit/auditd.conf, if multiple values are allowed write them separated by pipes as in \"syslog|single|halt\", for remediations the first value will be taken'", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_40", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", + "value": "{'default': 'single', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore', 'rotate': 'rotate', 'ol8': 'syslog|single|halt', 'rhel8': 'syslog|single|halt', 'cis_rhel8': 'single|halt', 'cis_rhel9': 'halt|single', 'cis_rhel10': 'halt|single', 'cis_fedora': 'halt|single', 'cis_ubuntu2204': 'halt|single', 'cis_ubuntu2404': 'halt|single', 'cis_debian12': 'halt|single'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_max_log_file_action", + "value": "var_auditd_max_log_file", "remarks": "rule_set_000" }, { "name": "Parameter_Description_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", + "value": "The setting for max_log_file in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_41", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", + "value": "{1: 1, 10: 10, 20: 20, 5: 5, 6: 6, 8: 8, 'default': 6}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_auditd_space_left_action", + "value": "var_auditd_max_log_file_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The setting for space_left_action in /etc/audit/auditd.conf", + "value": "The setting for max_log_file_action in /etc/audit/auditd.conf. The following options are available:
ignore - audit daemon does nothing.
syslog - audit daemon will issue a warning to syslog.
suspend - audit daemon will stop writing records to the disk.
rotate - audit daemon will rotate logs in the same convention used by logrotate.
keep_logs - similar to rotate but prevents audit logs to be overwritten. May trigger space_left_action if volume is full.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_42", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", + "value": "{'default': 'rotate', 'keep_logs': 'keep_logs', 'rotate': 'rotate', 'suspend': 'suspend', 'syslog': 'syslog', 'ignore': 'ignore'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_multiple_time_servers", + "value": "var_auditd_space_left_action", "remarks": "rule_set_000" }, { "name": "Parameter_Description_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The list of vendor-approved time servers", + "value": "The setting for space_left_action in /etc/audit/auditd.conf", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_43", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", + "value": "{'default': 'email', 'email': 'email', 'exec': 'exec', 'halt': 'halt', 'single': 'single', 'suspend': 'suspend', 'syslog': 'syslog', 'rotate': 'rotate', 'ignore': 'ignore', 'cis_rhel8': 'email|exec|single|halt', 'cis_rhel9': 'email|exec|single|halt', 'cis_rhel10': 'email|exec|single|halt', 'cis_fedora': 'email|exec|single|halt'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_pam_wheel_group_for_su", + "value": "var_multiple_time_servers", "remarks": "rule_set_000" }, { "name": "Parameter_Description_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", + "value": "The list of vendor-approved time servers", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_44", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sugroup', 'cis': 'sugroup'}", + "value": "{'default': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'generic': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'stig': '0.us.pool.ntp.mil', 'fedora': '0.fedora.pool.ntp.org,1.fedora.pool.ntp.org,2.fedora.pool.ntp.org,3.fedora.pool.ntp.org', 'rhel': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ol': '0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org,3.pool.ntp.org', 'suse': '0.suse.pool.ntp.org,1.suse.pool.ntp.org,2.suse.pool.ntp.org,3.suse.pool.ntp.org', 'alinux': '0.ntp.cloud.aliyuncs.com,1.ntp.aliyun.com,2.ntp1.aliyun.com,3.ntp1.cloud.aliyuncs.com', 'amazon': '0.rhel.pool.ntp.org,1.rhel.pool.ntp.org,2.rhel.pool.ntp.org,3.rhel.pool.ntp.org', 'ubuntu': '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org', 'almalinux': '0.almalinux.pool.ntp.org,1.almalinux.pool.ntp.org,2.almalinux.pool.ntp.org,3.almalinux.pool.ntp.org', 'debian': '0.debian.pool.ntp.org,1.debian.pool.ntp.org,2.debian.pool.ntp.org,3.debian.pool.ntp.org', 'nist': 'time.nist.gov,time-a-g.nist.gov,time-b-g.nist.gov,time-c-g.nist.gov'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm", + "value": "var_pam_wheel_group_for_su", "remarks": "rule_set_000" }, { "name": "Parameter_Description_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", + "value": "pam_wheel module has a parameter called group, which controls which groups can access the su command. This variable holds the valid value for the parameter.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'sugroup', 'cis': 'sugroup'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_hashing_algorithm_pam", + "value": "var_password_hashing_algorithm", "remarks": "rule_set_000" }, { "name": "Parameter_Description_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the value set as ENCRYPT_METHOD in /etc/login.defs.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_dictcheck", + "value": "var_password_hashing_algorithm_pam", "remarks": "rule_set_000" }, { "name": "Parameter_Description_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent the use of dictionary words for passwords.", + "value": "Specify the system default encryption algorithm for encrypting passwords. Defines the hashing algorithm to be used in pam_unix.so.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 'default': 1}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_difok", + "value": "var_password_pam_dictcheck", "remarks": "rule_set_000" }, { "name": "Parameter_Description_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters not present in old password", + "value": "Prevent the use of dictionary words for passwords.", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", + "value": "{1: 1, 'default': 1}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxrepeat", + "value": "var_password_pam_difok", "remarks": "rule_set_000" }, { "name": "Parameter_Description_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Repeating Characters in a Password", + "value": "Minimum number of characters not present in old password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_49", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", + "value": "{15: 15, 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 'default': 8}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_maxsequence", + "value": "var_password_pam_maxrepeat", "remarks": "rule_set_000" }, { "name": "Parameter_Description_50", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Maximum Number of Consecutive Character Sequences in a Password", + "value": "Maximum Number of Consecutive Repeating Characters in a Password", "remarks": "rule_set_000" }, { @@ -13896,251 +13936,269 @@ { "name": "Parameter_Id_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minclass", + "value": "var_password_pam_maxsequence", "remarks": "rule_set_000" }, { "name": "Parameter_Description_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of categories of characters that must exist in a password", + "value": "Maximum Number of Consecutive Character Sequences in a Password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_51", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", + "value": "{1: 1, 2: 2, 3: 3, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_minlen", + "value": "var_password_pam_minclass", "remarks": "rule_set_000" }, { "name": "Parameter_Description_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Minimum number of characters in password", + "value": "Minimum number of categories of characters that must exist in a password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_52", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", + "value": "{1: 1, 2: 2, 3: 3, 4: 4, 'default': 3}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember", + "value": "var_password_pam_minlen", "remarks": "rule_set_000" }, { "name": "Parameter_Description_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent password reuse using password history lookup", + "value": "Minimum number of characters in password", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_53", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "value": "{10: 10, 12: 12, 14: 14, 15: 15, 17: 17, 18: 18, 20: 20, 6: 6, 7: 7, 8: 8, 'default': 15}", "remarks": "rule_set_000" }, { "name": "Parameter_Id_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "var_password_pam_remember_control_flag", + "value": "var_password_pam_remember", "remarks": "rule_set_000" }, { "name": "Parameter_Description_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "value": "Prevent password reuse using password history lookup", "remarks": "rule_set_000" }, { "name": "Parameter_Value_Alternatives_54", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Id_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "var_password_pam_remember_control_flag", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Description_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "'Specify the control flag required for password remember requirement. If multiple values are allowed write them separated by commas as in \"required,requisite\", for remediations the first value will be taken'", + "remarks": "rule_set_000" + }, + { + "name": "Parameter_Value_Alternatives_55", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'required': 'required', 'optional': 'optional', 'requisite': 'requisite', 'sufficient': 'sufficient', 'binding': 'binding', 'ol8': 'required,requisite', 'requisite_or_required': 'requisite,required', 'default': 'requisite'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_55", + "name": "Parameter_Id_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_postfix_inet_interfaces", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_55", + "name": "Parameter_Description_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The setting for inet_interfaces in /etc/postfix/main.cf", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_55", + "name": "Parameter_Value_Alternatives_56", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'loopback-only': 'loopback-only', 'default': 'loopback-only', 'localhost': 'localhost'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_56", + "name": "Parameter_Id_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_screensaver_lock_delay", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_56", + "name": "Parameter_Description_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Choose allowed duration (in seconds) after a screensaver becomes active before displaying an authentication prompt", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_56", + "name": "Parameter_Value_Alternatives_57", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'10_seconds': 10, '5_seconds': 5, 'default': '0', 'immediate': '0'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_57", + "name": "Parameter_Id_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_selinux_policy_name", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_57", + "name": "Parameter_Description_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Type of policy in use. Possible values are:
targeted - Only targeted network daemons are protected.
strict - Full SELinux protection.
mls - Multiple levels of security", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_57", + "name": "Parameter_Value_Alternatives_58", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'targeted', 'mls': 'mls', 'targeted': 'targeted'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_58", + "name": "Parameter_Id_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_selinux_state", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_58", + "name": "Parameter_Description_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enforcing - SELinux security policy is enforced.
permissive - SELinux prints warnings instead of enforcing.
disabled - SELinux is fully disabled.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_58", + "name": "Parameter_Value_Alternatives_59", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 'enforcing', 'disabled': 'disabled', 'enforcing': 'enforcing', 'permissive': 'permissive'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_59", + "name": "Parameter_Id_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_max_sessions", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_59", + "name": "Parameter_Description_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the maximum number of open sessions permitted.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_59", + "name": "Parameter_Value_Alternatives_60", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 4: 4, 3: 3, 2: 2, 1: 1, 0: 0, 'default': 10}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_60", + "name": "Parameter_Id_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_keepalive", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_60", + "name": "Parameter_Description_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the maximum number of idle message counts before session is terminated.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_60", + "name": "Parameter_Value_Alternatives_61", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{10: 10, 3: 3, 5: 5, 0: 0, 1: 1, 'default': 0}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_61", + "name": "Parameter_Id_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_login_grace_time", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_61", + "name": "Parameter_Description_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure parameters for how long the servers stays connected before the user has successfully logged in", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_61", + "name": "Parameter_Value_Alternatives_62", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': 60, 60: 60}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_62", + "name": "Parameter_Id_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sshd_set_maxstartups", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_62", + "name": "Parameter_Description_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure parameters for maximum concurrent unauthenticated connections to the SSH daemon.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_62", + "name": "Parameter_Value_Alternatives_63", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '10:30:100', '10:30:60': '10:30:60'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_63", + "name": "Parameter_Id_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_sudo_timestamp_timeout", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_63", + "name": "Parameter_Description_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Defines the number of minutes that can elapse before sudo will ask for a passwd again. If set to a value less than 0 the user's time stamp will never expire. Defining 0 means always prompt for a password. The default timeout value is 5 minutes.", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_63", + "name": "Parameter_Value_Alternatives_64", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '5', 'always_prompt': '0', '1_minute': '1', '2_minutes': '2', '3_minutes': '3', '5_minutes': '5', '15_minutes': '15'}", "remarks": "rule_set_000" }, { - "name": "Parameter_Id_64", + "name": "Parameter_Id_65", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "var_user_initialization_files_regex", "remarks": "rule_set_000" }, { - "name": "Parameter_Description_64", + "name": "Parameter_Description_65", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "'A regular expression describing a list of file names for files that are sourced at login time for interactive users'", "remarks": "rule_set_000" }, { - "name": "Parameter_Value_Alternatives_64", + "name": "Parameter_Value_Alternatives_65", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "{'default': '^(\\\\.bashrc|\\\\.zshrc|\\\\.cshrc|\\\\.profile|\\\\.bash_login|\\\\.bash_profile)$', 'all_dotfiles': '^\\\\.[\\\\w\\\\- ]+$'}", "remarks": "rule_set_000" @@ -14772,9727 +14830,9751 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_fedora_gpgkey_installed", "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure Fedora GPG Key Installed", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libselinux_installed", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libselinux Package", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_enable_selinux", + "value": "package_libselinux_installed", "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux Not Disabled in /etc/default/grub", + "value": "Install libselinux Package", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "grub2_enable_selinux", "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux Not Disabled in /etc/default/grub", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_not_disabled", + "value": "selinux_policytype", "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux is Not Disabled", + "value": "Configure SELinux Policy", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_mcstrans_removed", + "value": "selinux_not_disabled", "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall mcstrans Package", + "value": "Ensure SELinux is Not Disabled", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_mcstrans_removed", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "package_mcstrans_removed", "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Uninstall mcstrans Package", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_boot_grub2", + "value": "grub2_password", "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must have mode 0600 or more restrictive", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_boot_grub2", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be owned by root", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_boot_grub2", + "value": "file_owner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GRUB configuration files must be group-owned by root", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "disable_users_coredumps", "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "coredump_disable_backtraces", "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable core dump backtraces", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "coredump_disable_storage", "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Disable storing core dump", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "banner_etc_motd_cis", + "remarks": "rule_set_049" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure Message Of The Day Is Configured Properly", + "remarks": "rule_set_049" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "banner_etc_motd_cis", + "remarks": "rule_set_049" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_049" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "banner_etc_issue_cis", + "remarks": "rule_set_050" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nftables_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install nftables Package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nftables_disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify nftables Service is Disabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_restricted", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Restrict Loopback Traffic", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_modules_in_authselect_profile", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Active Authselect Profile Includes PAM Modules", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_387" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_388" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_389" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_390" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_396" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_397" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_398" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_399" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_400" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_401" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_402" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_403" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_404" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_405" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_406" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_407" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_408" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_var_lib_selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in /var/lib/selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_var_lib_selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in /var/lib/selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_415" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_416" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_417" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_create", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - create_module", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_create", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - create_module", - "remarks": "rule_set_418" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_419" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_420" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_423" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_425" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_426" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_428" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_429" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_430" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_432" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_431" + "remarks": "rule_set_432" } ], "control-implementations": [ { - "uuid": "5c0569bd-c1ba-49c4-8747-f14448a0c2a4", + "uuid": "0bfea9a0-2686-4387-acd4-ff713912857d", "source": "trestle://profiles/fedora-cis_fedora-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -24510,17 +24592,23 @@ ] }, { - "param-id": "inactivity_timeout_value", + "param-id": "dconf_login_banner_contents", "values": [ - "15_minutes" + "cis_default" ] }, { - "param-id": "login_banner_text", + "param-id": "dconf_login_banner_text", "values": [ "cis_banners" ] }, + { + "param-id": "inactivity_timeout_value", + "values": [ + "15_minutes" + ] + }, { "param-id": "sshd_idle_timeout_value", "values": [ @@ -24896,7 +24984,7 @@ ], "implemented-requirements": [ { - "uuid": "a2f9e8fc-8c99-490e-947d-2122f7c9f831", + "uuid": "c499c9a3-8465-460e-9f3f-6538aa48594c", "control-id": "cis_fedora_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -24913,7 +25001,7 @@ ] }, { - "uuid": "a58cfae3-c033-4122-b4ce-1de4dbcd3a8a", + "uuid": "2fa97a5d-f6f2-4d06-b7fb-b023452c6101", "control-id": "cis_fedora_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -24930,7 +25018,7 @@ ] }, { - "uuid": "b4b783fe-1eb1-451e-8fe6-071bc3c3f2d2", + "uuid": "33a8489f-0065-4363-ab02-b3807f6d1c0d", "control-id": "cis_fedora_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -24947,7 +25035,7 @@ ] }, { - "uuid": "64729151-5a68-4f1f-9f80-f4735db31561", + "uuid": "54819679-fbfb-4ae9-aa8c-d09ab8a19c8d", "control-id": "cis_fedora_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -24964,7 +25052,7 @@ ] }, { - "uuid": "b988162b-9e5a-4fe4-8f8c-9ff390eee18a", + "uuid": "48f42fd5-5f53-4fae-9588-2f6f20f12382", "control-id": "cis_fedora_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -24981,7 +25069,7 @@ ] }, { - "uuid": "60b27d8a-5550-4718-b9e6-28ff449a4f39", + "uuid": "bb60ebe7-a831-4761-b8f7-8eca6ec08a28", "control-id": "cis_fedora_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -24998,7 +25086,7 @@ ] }, { - "uuid": "a886e691-1db5-4106-b71c-bcac0107e426", + "uuid": "f0622686-5816-40f5-b16d-88663bc8268a", "control-id": "cis_fedora_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25015,7 +25103,7 @@ ] }, { - "uuid": "30a40552-d2b1-4fe3-a62c-bc1c92a7f10a", + "uuid": "971e29f3-664a-495f-a9fb-a0eb84474fe2", "control-id": "cis_fedora_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25032,7 +25120,7 @@ ] }, { - "uuid": "821e4ca1-1070-4138-ae72-5e4f62366c20", + "uuid": "d2b673fa-d60a-475f-9992-111feecb2f20", "control-id": "cis_fedora_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25049,7 +25137,7 @@ ] }, { - "uuid": "73f58098-da38-4998-9538-29c9e76ba11a", + "uuid": "f1bc5eb1-6bc8-4383-8e49-a475f7b260d1", "control-id": "cis_fedora_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25066,7 +25154,7 @@ ] }, { - "uuid": "f2389a28-c748-4b4a-992a-4234a1eba3c8", + "uuid": "b8006968-6c23-47c7-8f5f-51bca66798fd", "control-id": "cis_fedora_1-2.1.3", "description": "The description for control-id cis_fedora_1-2.1.3.", "props": [ @@ -25079,7 +25167,7 @@ ] }, { - "uuid": "4aa9d487-8a03-48fb-a8d1-9efdefb82e5f", + "uuid": "54aabdbb-fbc7-43b3-a2c4-1ff50f23e216", "control-id": "cis_fedora_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25096,7 +25184,7 @@ ] }, { - "uuid": "bcea3c7b-eda8-4ffc-9fd2-9b74dac7c089", + "uuid": "294095ac-b365-4f6e-a789-eec7d40e4523", "control-id": "cis_fedora_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25113,7 +25201,7 @@ ] }, { - "uuid": "b18d6d41-b862-4ddb-91ad-13dce6e8163b", + "uuid": "167ec285-4bf7-4d49-8bf1-6f6ab1152a2c", "control-id": "cis_fedora_1-3.1.6", "description": "The description for control-id cis_fedora_1-3.1.6.", "props": [ @@ -25126,7 +25214,7 @@ ] }, { - "uuid": "d55493a2-baae-45ac-bea5-370dcc8bd585", + "uuid": "7d14ad5a-3fbe-43ff-ae7e-0ee9f8120052", "control-id": "cis_fedora_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -25148,7 +25236,7 @@ ] }, { - "uuid": "1c2e5a82-e995-4c57-8c88-7a01decc3d5a", + "uuid": "9ace0544-6f54-424f-b47d-9dffcbe26d97", "control-id": "cis_fedora_1-8.7", "description": "No notes for control-id 1.8.7.", "props": [ @@ -25165,7 +25253,7 @@ ] }, { - "uuid": "f340cd82-816d-4913-be34-9a9591772338", + "uuid": "3693caec-9583-499f-8624-89c56a151941", "control-id": "cis_fedora_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -25182,7 +25270,7 @@ ] }, { - "uuid": "f9dc1de6-c335-4836-a94a-b31f2cf3c367", + "uuid": "c592090c-86f2-48dc-87d0-fa81619ccf24", "control-id": "cis_fedora_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -25199,7 +25287,7 @@ ] }, { - "uuid": "2ba170c5-c38b-4133-9124-f65d47b5fd1b", + "uuid": "bc2a96ff-2d9d-4bae-8dac-0b0670b1efb0", "control-id": "cis_fedora_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25216,7 +25304,7 @@ ] }, { - "uuid": "a5ea266d-c2b6-48c2-ac81-88aa334d29bb", + "uuid": "2a61211e-436c-42e2-a90b-44a3c39cf7cb", "control-id": "cis_fedora_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25233,7 +25321,7 @@ ] }, { - "uuid": "a6dc69f7-011e-4764-bcc0-1f6283d32383", + "uuid": "f56ab77d-0440-49f3-a406-3c347d544b8f", "control-id": "cis_fedora_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -25250,7 +25338,7 @@ ] }, { - "uuid": "b6e1f95b-b45c-4a24-8d0d-4916c7ea143e", + "uuid": "e02ef2a1-cb90-4289-b0ed-f029341c59c1", "control-id": "cis_fedora_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -25267,7 +25355,7 @@ ] }, { - "uuid": "0e851b68-a9af-4ed4-a6d3-d48d1ac634c4", + "uuid": "bb583eae-45c7-48c3-b80c-3d4ff3a7b007", "control-id": "cis_fedora_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25284,7 +25372,7 @@ ] }, { - "uuid": "64848bb3-f69d-4789-a728-1a24d53c7baf", + "uuid": "2d3a9ce3-4c33-4c16-ad0a-ec257a62e615", "control-id": "cis_fedora_5-3.3.1.3", "description": "No notes for control-id 5.3.3.1.3.", "props": [ @@ -25301,7 +25389,7 @@ ] }, { - "uuid": "7dcb54d1-b2b5-4de7-955b-9975394840d4", + "uuid": "e10759d1-8d12-4416-ba7d-8faaa6a49d8e", "control-id": "cis_fedora_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25323,7 +25411,7 @@ ] }, { - "uuid": "83cd143d-a78a-43fe-8ac7-98ee8f737aba", + "uuid": "a95b26c6-67de-4912-87f3-8bb4fc05a499", "control-id": "cis_fedora_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25340,7 +25428,7 @@ ] }, { - "uuid": "440e8132-c5cf-4922-a8aa-121630459521", + "uuid": "80dcc159-1488-47ac-b625-f1ab6593f380", "control-id": "cis_fedora_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25362,7 +25450,7 @@ ] }, { - "uuid": "3a9cc003-0d94-4a3a-b1fd-c6acc34547c2", + "uuid": "d45e0a20-905a-4483-b4f0-849fc5f23d4a", "control-id": "cis_fedora_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25379,7 +25467,7 @@ ] }, { - "uuid": "30e8676e-5a70-4d17-89c2-b2411e7d9e09", + "uuid": "eec70454-c503-476a-aff1-70c9b3641df5", "control-id": "cis_fedora_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25396,7 +25484,7 @@ ] }, { - "uuid": "c5fedc95-751e-493c-bfef-c1f10c42bf68", + "uuid": "6651f686-184a-4b98-a52b-e32e287c3835", "control-id": "cis_fedora_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25413,7 +25501,7 @@ ] }, { - "uuid": "1fd7ddcc-b2b3-4631-a391-41fc8a870b3c", + "uuid": "18d71b95-52b2-4a25-8159-234680d9afa9", "control-id": "cis_fedora_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25430,7 +25518,7 @@ ] }, { - "uuid": "c90d1096-5bb9-4f6a-b6b7-7eec8766ac7c", + "uuid": "e7048294-f853-4120-87ca-171ae162c7f4", "control-id": "cis_fedora_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25447,7 +25535,7 @@ ] }, { - "uuid": "69ebeef8-2b56-4f4d-847c-0af3e7ff7198", + "uuid": "b429cafa-60b1-465d-9b9f-d903b0a51cd8", "control-id": "cis_fedora_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25469,7 +25557,7 @@ ] }, { - "uuid": "37d64ae4-a70a-4351-a4a7-20548e36b9d8", + "uuid": "99b9af5e-b11d-47a1-be4d-668c22c0f2f5", "control-id": "cis_fedora_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25491,7 +25579,7 @@ ] }, { - "uuid": "eeaeb16d-f79f-4fcd-95d7-83e6693a76fe", + "uuid": "40de5219-4d07-4d8d-a4fa-3c42fc3d74c6", "control-id": "cis_fedora_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25508,7 +25596,7 @@ ] }, { - "uuid": "457794df-f0e5-433e-a83a-19cc0dbd7016", + "uuid": "17ec022f-c71d-498b-baa1-4db7c55cf38b", "control-id": "cis_fedora_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25525,7 +25613,7 @@ ] }, { - "uuid": "802126c3-b914-4718-98b7-508d2aab035d", + "uuid": "aa00f79a-7d0f-4ee2-98c9-1903f29f22ed", "control-id": "cis_fedora_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25542,7 +25630,7 @@ ] }, { - "uuid": "2a62c810-745b-4bbc-8ca2-51781c868eaf", + "uuid": "4c61f0d4-d1e1-4bc2-93dc-bd6b7bdb123a", "control-id": "cis_fedora_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25574,7 +25662,7 @@ ] }, { - "uuid": "3e127467-047f-42d2-807f-08db106d8a82", + "uuid": "0e80c97a-4457-486e-972e-a8d925232c0a", "control-id": "cis_fedora_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25596,7 +25684,7 @@ ] }, { - "uuid": "749c7a69-269e-479d-95de-4a3614f2a9d4", + "uuid": "7b47e09b-343f-45dd-982e-3308402e6bd6", "control-id": "cis_fedora_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25618,7 +25706,7 @@ ] }, { - "uuid": "b714ffe7-9af4-49e3-bc17-838f7dfa07e4", + "uuid": "9988ee61-3919-4aa2-8854-c881af8d4b28", "control-id": "cis_fedora_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25640,7 +25728,7 @@ ] }, { - "uuid": "42abff5c-9a94-48aa-9760-90982f5af7f4", + "uuid": "1ac8231b-291d-4057-b5ca-e8367baad2cc", "control-id": "cis_fedora_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25662,7 +25750,7 @@ ] }, { - "uuid": "73269b80-7fee-4652-acd4-07f2d9dee6a2", + "uuid": "c2af51a7-4d10-4cdf-868d-33d106a94f43", "control-id": "cis_fedora_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25679,7 +25767,7 @@ ] }, { - "uuid": "a521581c-9cd9-4ff0-856a-20d38a460b76", + "uuid": "a5a8f296-aa45-43c9-af0c-87f90f17406a", "control-id": "cis_fedora_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25696,7 +25784,7 @@ ] }, { - "uuid": "56b63da2-5999-4891-abaf-bef97c4ca0b3", + "uuid": "be38b041-6368-4e46-8822-f89b06b52f5a", "control-id": "cis_fedora_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25733,7 +25821,7 @@ ] }, { - "uuid": "844f21f7-1230-4b00-9126-35f2bd3caf64", + "uuid": "d063783a-8caf-4669-90e5-9c44a9da63f4", "control-id": "cis_fedora_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25750,7 +25838,7 @@ ] }, { - "uuid": "d9b84d1d-e5a3-4296-b269-e03487d07216", + "uuid": "2bc09fce-f64d-4e3f-97e7-6406620f3afb", "control-id": "cis_fedora_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25767,7 +25855,7 @@ ] }, { - "uuid": "67c018b7-6591-4d2e-a0ae-f62566664bc1", + "uuid": "24846626-cd1d-4acb-b865-5e8c6b8267dd", "control-id": "cis_fedora_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -25789,7 +25877,7 @@ ] }, { - "uuid": "118ee317-a05a-4cca-ac42-b8676b84493b", + "uuid": "741e8456-12e4-4377-b5a6-8874f555856c", "control-id": "cis_fedora_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -25806,7 +25894,7 @@ ] }, { - "uuid": "b27491a3-eef8-4985-a857-f03b9190e64d", + "uuid": "26962ecc-ef1c-4613-a13c-bdf28a34b7c1", "control-id": "cis_fedora_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -25823,7 +25911,7 @@ ] }, { - "uuid": "40b656bf-35c2-4360-b898-c10d3ac2eb5d", + "uuid": "2c32771b-3538-4ad7-912c-58e3dc3ca845", "control-id": "cis_fedora_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -25845,7 +25933,7 @@ ] }, { - "uuid": "2caeb2b9-563e-42fc-87f5-4ed3e7ca7703", + "uuid": "d230e2e6-3f47-4b8e-aa7f-c6df5bb6d2e9", "control-id": "cis_fedora_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -25927,7 +26015,7 @@ ] }, { - "uuid": "9a1c67ca-4dd6-4250-9a73-1faf647a4c62", + "uuid": "6c953c82-1544-418b-a73c-186349a1549b", "control-id": "cis_fedora_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -25944,7 +26032,7 @@ ] }, { - "uuid": "26cb8e7e-973c-4ab9-9849-b7f6dc015b0e", + "uuid": "306aff92-94f1-4448-ae69-2283c50f05e4", "control-id": "cis_fedora_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -25971,7 +26059,7 @@ ] }, { - "uuid": "45ec998c-0c98-43aa-a36f-00c7a9e6ddf9", + "uuid": "5bb1f5f9-076a-40c5-8584-97329a8afbec", "control-id": "cis_fedora_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -25993,7 +26081,7 @@ ] }, { - "uuid": "7372c459-5c41-470b-a042-ebd1c538ecc6", + "uuid": "7e9cf950-a5c1-4bcc-8cae-f858d02ebdd5", "control-id": "cis_fedora_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26030,7 +26118,7 @@ ] }, { - "uuid": "0123f834-36e2-4923-9425-0a5c47058a6b", + "uuid": "443ae0fe-4bfb-4b18-9908-aafc27d95a8d", "control-id": "cis_fedora_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26057,7 +26145,7 @@ ] }, { - "uuid": "2cfa3aad-20de-4e6d-99b1-56a9aa79db2f", + "uuid": "dee85d55-3179-4e46-ad44-18ae5f39ad65", "control-id": "cis_fedora_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26074,7 +26162,7 @@ ] }, { - "uuid": "8f298d0e-f8c7-4535-b4e9-fcd6918c04ea", + "uuid": "a2a1f27a-80cd-4f33-9f41-0d37bbaff772", "control-id": "cis_fedora_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26091,7 +26179,7 @@ ] }, { - "uuid": "d988fb09-34bf-4da6-a968-db2d036133d8", + "uuid": "d9680249-69bf-4bf8-8650-0d47fd5b9d50", "control-id": "cis_fedora_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26108,7 +26196,7 @@ ] }, { - "uuid": "88469cd2-0178-44fc-80f6-192f3970a249", + "uuid": "bb7436da-e000-494d-aa9d-de2c7eb19347", "control-id": "cis_fedora_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26125,7 +26213,7 @@ ] }, { - "uuid": "a45e1760-4c85-4b46-a9fa-b0c4f8bc19c0", + "uuid": "e5bf92bf-bc31-45ff-97b3-3d9eece06730", "control-id": "cis_fedora_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26142,7 +26230,7 @@ ] }, { - "uuid": "06bf7905-c08d-4654-82b4-a13654c7a800", + "uuid": "0185f9fd-f676-48b7-b639-a92c21586470", "control-id": "cis_fedora_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26164,7 +26252,7 @@ ] }, { - "uuid": "1198e4cb-c26f-409f-9ba2-a0ab17978ec2", + "uuid": "99e6c29e-72ab-40fa-a510-c43a3f9daf3c", "control-id": "cis_fedora_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26181,7 +26269,7 @@ ] }, { - "uuid": "34026ce5-74ed-4a19-a6d1-03819cd796f3", + "uuid": "0b80f889-0e21-46ce-9623-de028e55e806", "control-id": "cis_fedora_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26203,7 +26291,7 @@ ] }, { - "uuid": "672a3163-64ca-4524-bb7d-6d5f446b9702", + "uuid": "f673f9c7-af8d-4678-b192-acbdab9eda80", "control-id": "cis_fedora_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26220,7 +26308,7 @@ ] }, { - "uuid": "a3f151b1-e5c5-4545-b09a-86eead1a241c", + "uuid": "e6aec6a9-b5aa-4e6b-9225-4067f221de64", "control-id": "cis_fedora_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26237,7 +26325,7 @@ ] }, { - "uuid": "9795221f-4a66-4577-8395-4aea5a13350d", + "uuid": "da315d23-1f89-431a-a07a-6507032c1c36", "control-id": "cis_fedora_6-3.3.34", "description": "The description for control-id cis_fedora_6-3.3.34.", "props": [ @@ -26250,7 +26338,7 @@ ] }, { - "uuid": "44508bb6-d10f-48f9-9b31-87f93dc426ee", + "uuid": "f1655c97-da46-4185-823a-9daf7f99ba38", "control-id": "cis_fedora_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26267,7 +26355,7 @@ ] }, { - "uuid": "848e9163-a545-4879-a861-174a34906a02", + "uuid": "2fd5c83f-22e0-4d31-b6c9-41dc1c5b4c06", "control-id": "cis_fedora_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26284,7 +26372,7 @@ ] }, { - "uuid": "83f8b120-6c80-49ca-bc56-646f072fbc16", + "uuid": "439aefad-08c4-465e-a672-f7757729e53e", "control-id": "cis_fedora_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26301,7 +26389,7 @@ ] }, { - "uuid": "62666e2f-1556-4611-9607-d263b5e1c103", + "uuid": "7e6c9100-149e-4df3-ad68-d4ab6a0ec8af", "control-id": "cis_fedora_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26318,7 +26406,7 @@ ] }, { - "uuid": "396c259c-f4dd-4c1f-bcad-24235fb487dc", + "uuid": "e0303529-503b-4b71-8d03-608776797568", "control-id": "cis_fedora_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26335,7 +26423,7 @@ ] }, { - "uuid": "5e1e3d07-98cf-406f-a968-d193d533b975", + "uuid": "1d87364f-1f0b-4312-9ab8-8c10e6a52023", "control-id": "cis_fedora_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26352,7 +26440,7 @@ ] }, { - "uuid": "210fec54-fc37-42d1-989b-029e2025159b", + "uuid": "6aaa72c8-b477-43b2-9772-7a86b08772f0", "control-id": "cis_fedora_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26369,7 +26457,7 @@ ] }, { - "uuid": "7b6763a3-0f1d-480f-82bf-f2d7580aeed7", + "uuid": "ed8a5460-187d-43f0-becf-aa4664a568f6", "control-id": "cis_fedora_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26386,7 +26474,7 @@ ] }, { - "uuid": "40bb4448-ed66-40db-8c26-ab3132723143", + "uuid": "bbd08316-7e7b-48ae-aff5-7bca3eb0fc61", "control-id": "cis_fedora_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26403,7 +26491,7 @@ ] }, { - "uuid": "e118e524-2a63-4b67-954c-39abb54d004a", + "uuid": "5a567b77-8f09-4381-a013-e4ea7282cdf1", "control-id": "cis_fedora_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26420,7 +26508,7 @@ ] }, { - "uuid": "d4254c16-f758-4017-a995-e74a1b5dc892", + "uuid": "071b846b-e8fe-43af-bf8d-024d42ec0553", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26437,7 +26525,7 @@ ] }, { - "uuid": "8bcf3067-196b-4d2d-9504-f1ce545c190c", + "uuid": "06618b59-c8b4-4cad-8e2f-000373944bbf", "control-id": "cis_fedora_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26454,7 +26542,7 @@ ] }, { - "uuid": "d701413b-15f0-4346-bec4-db3444c24f39", + "uuid": "64458344-8d35-4313-a0c1-88c66f47e8dc", "control-id": "cis_fedora_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26471,7 +26559,7 @@ ] }, { - "uuid": "9cfa8800-b523-423c-96a2-80f0e0ab9a92", + "uuid": "60496893-54c5-4522-b65f-84c19cb635d2", "control-id": "cis_fedora_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26488,7 +26576,7 @@ ] }, { - "uuid": "a964c96b-1046-480b-8eda-ceb3cc895953", + "uuid": "cd89835a-d184-44a5-8a86-f751196684fe", "control-id": "cis_fedora_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26505,7 +26593,7 @@ ] }, { - "uuid": "36a92ae8-12ed-44af-9a91-42e158ae6972", + "uuid": "d3c0d608-c424-4974-8113-2a7844fbf243", "control-id": "cis_fedora_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26522,7 +26610,7 @@ ] }, { - "uuid": "5d550241-0b8a-4d74-9f2a-0e675c091f7f", + "uuid": "3e0398b7-2f81-4532-989d-fa39b4165bd4", "control-id": "cis_fedora_1-1.1.11", "description": "The description for control-id cis_fedora_1-1.1.11.", "props": [ @@ -26535,7 +26623,7 @@ ] }, { - "uuid": "99ca2821-6835-4441-a6b8-ec7d616533bd", + "uuid": "d9761cf3-1b26-4a90-bdc3-cc1b55885d71", "control-id": "cis_fedora_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26552,7 +26640,7 @@ ] }, { - "uuid": "2af9f805-b597-48fc-bb23-85ee511db87b", + "uuid": "5ca9a0c4-63c5-443f-9cc0-b7db29fd5c67", "control-id": "cis_fedora_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26569,7 +26657,7 @@ ] }, { - "uuid": "f822e9ad-e213-47c9-82f1-5555101275e6", + "uuid": "1c805b94-59e8-4f35-8832-854ff680929f", "control-id": "cis_fedora_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26586,7 +26674,7 @@ ] }, { - "uuid": "63aff1bc-ebbd-4f87-a50f-5d92418b1908", + "uuid": "447027e4-63c5-419e-be95-311360f84004", "control-id": "cis_fedora_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26603,7 +26691,7 @@ ] }, { - "uuid": "1f7cd60a-ffd2-43ff-a584-3c518c8fb74e", + "uuid": "97481f19-4eec-4207-a1b4-450d265b40d1", "control-id": "cis_fedora_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26620,7 +26708,7 @@ ] }, { - "uuid": "1da3c89b-c471-4785-bbef-fe8adec553ab", + "uuid": "0ca39a58-cb21-43a8-8ee6-40ed6f46cc87", "control-id": "cis_fedora_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26637,7 +26725,7 @@ ] }, { - "uuid": "d51ca715-fcf8-479a-a584-e698cd377b41", + "uuid": "5a50d5cc-c65f-47c1-9266-6debefe4135e", "control-id": "cis_fedora_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26654,7 +26742,7 @@ ] }, { - "uuid": "dee60b9e-fb65-42b5-8a51-f70dc38a09a9", + "uuid": "7c5f0c8c-aae9-4406-b18d-c53bfe417136", "control-id": "cis_fedora_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26671,7 +26759,7 @@ ] }, { - "uuid": "9261047a-c258-4633-a01f-332bb0fd0373", + "uuid": "7e7d0216-00fe-41bc-a6a4-2ff1947c6a8c", "control-id": "cis_fedora_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26688,7 +26776,7 @@ ] }, { - "uuid": "c9d8f327-aaa9-413a-836f-f83ff84bb62a", + "uuid": "cde9b42f-9899-4819-ace1-9f47162d2213", "control-id": "cis_fedora_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26705,7 +26793,7 @@ ] }, { - "uuid": "f98ce05c-a7df-4763-b04c-3c044804a4bb", + "uuid": "9a68444d-2fc2-4e0e-9452-7bd1a6777035", "control-id": "cis_fedora_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -26722,7 +26810,7 @@ ] }, { - "uuid": "ac6089f0-9d6f-4475-a8e0-54a166ced1df", + "uuid": "bdf8cd1d-d6ee-432b-9784-8fff5d5aa397", "control-id": "cis_fedora_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -26739,7 +26827,7 @@ ] }, { - "uuid": "f0c6e2d3-dbe0-4521-a95a-b0f5a4a3f3db", + "uuid": "40d225ea-1efd-4beb-aed3-9f8efb8a5f6a", "control-id": "cis_fedora_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -26756,7 +26844,7 @@ ] }, { - "uuid": "b0c229b2-2c6d-404b-a628-234cc069d548", + "uuid": "a263c307-fb60-4ba1-befb-d957d05c3836", "control-id": "cis_fedora_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -26773,7 +26861,7 @@ ] }, { - "uuid": "e936175b-5c5a-423d-b2f7-4df6395a67de", + "uuid": "71cc5cd2-219b-4c82-bb58-e6a702f4cb17", "control-id": "cis_fedora_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -26790,7 +26878,7 @@ ] }, { - "uuid": "68807c6f-98bb-42b8-a915-01fab509fd49", + "uuid": "ec08b50d-689c-4245-9a8e-20ef173bf619", "control-id": "cis_fedora_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -26807,7 +26895,7 @@ ] }, { - "uuid": "332b30c6-1553-4316-abd7-f3f8f9cc2c8e", + "uuid": "3269d26a-fa86-4f30-98b5-dd54ee7cb1a6", "control-id": "cis_fedora_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -26824,7 +26912,7 @@ ] }, { - "uuid": "044f405b-ff32-4d10-bfc7-aa7886883674", + "uuid": "e68bef73-b481-41dc-90ac-21ac194b01c6", "control-id": "cis_fedora_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -26841,7 +26929,7 @@ ] }, { - "uuid": "860f719f-a73e-4a55-adc5-5219de452f1a", + "uuid": "263365f9-6806-4a95-8a16-2a4f152c3b89", "control-id": "cis_fedora_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -26858,7 +26946,7 @@ ] }, { - "uuid": "35d604c7-aefb-4eae-93b6-ac160d066239", + "uuid": "4cc8d3d9-445b-406b-a061-43f5bb3d27ad", "control-id": "cis_fedora_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -26875,7 +26963,7 @@ ] }, { - "uuid": "f310f7fa-f1a4-48ef-8c4c-fd0b8b528059", + "uuid": "3b63c940-1ed2-4e23-ba9d-8633a4194a07", "control-id": "cis_fedora_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -26892,20 +26980,24 @@ ] }, { - "uuid": "d896be9c-c7d6-4dc7-ada7-0a8eebe2424a", + "uuid": "d41aa37e-73ff-48e2-b7a8-4cbcc943a6bd", "control-id": "cis_fedora_1-2.1.1", - "description": "The description for control-id cis_fedora_1-2.1.1.", + "description": "In CIS Benchmark, the requirement is manual, because of GPG keys for 3rd party repositories. But, add the rule ensure_fedora_gpgkey_installed to the profile because the requirement 1.2.1.2 adds ensure_gpgcheck_globally_activated which requires GPG key checking. If the Fedora GPG key wouldn't be installed, people won't be able to install any RPM package using dnf.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "No notes for control-id 1.2.1.1." + "value": "partial" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_fedora_gpgkey_installed" } ] }, { - "uuid": "2ad8482e-65c9-41f9-9aaa-e215e311f263", + "uuid": "0df32e24-6fa0-49ff-832f-b13b57a5d00c", "control-id": "cis_fedora_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -26922,7 +27014,7 @@ ] }, { - "uuid": "777fcb44-ee81-4c69-9634-f759cfddd6f8", + "uuid": "18b94ccf-08c8-4ef1-adae-8325e5a3197d", "control-id": "cis_fedora_1-2.1.4", "description": "The description for control-id cis_fedora_1-2.1.4.", "props": [ @@ -26935,7 +27027,7 @@ ] }, { - "uuid": "7b4c86a0-8355-4810-bdf9-648023277ce4", + "uuid": "ca654397-aee8-4a3e-8238-1ef63f9d3629", "control-id": "cis_fedora_1-2.2.1", "description": "The description for control-id cis_fedora_1-2.2.1.", "props": [ @@ -26948,7 +27040,7 @@ ] }, { - "uuid": "6727889e-e456-4334-ad86-8c4ffca1f41f", + "uuid": "fab2b2e3-f464-4b40-88a2-ce7f71a44f63", "control-id": "cis_fedora_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -26965,7 +27057,7 @@ ] }, { - "uuid": "d76837cc-c31b-419d-a432-ff88430166e1", + "uuid": "014af4e3-300d-453c-8c43-c6b892e99732", "control-id": "cis_fedora_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -26982,7 +27074,7 @@ ] }, { - "uuid": "a59f21bc-6397-4d39-a0f9-fc987135dc3f", + "uuid": "a4e89075-96a2-4439-b7ee-9fb3bfdf1bf6", "control-id": "cis_fedora_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -26999,7 +27091,7 @@ ] }, { - "uuid": "5ff35aef-a49c-442f-9446-3bc565e733cd", + "uuid": "8cbba419-97a9-4ec7-84a0-4e394ade703f", "control-id": "cis_fedora_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27016,7 +27108,7 @@ ] }, { - "uuid": "8468f472-ce59-4764-98ac-3d007d8b8265", + "uuid": "43bec67c-7757-4ad1-beff-c6dce166e6df", "control-id": "cis_fedora_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27033,7 +27125,7 @@ ] }, { - "uuid": "8d99426c-aab8-4969-a62b-7e9b45f972a0", + "uuid": "dc25a27e-bc3d-4633-bfce-7bd8ab929ef7", "control-id": "cis_fedora_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27050,7 +27142,7 @@ ] }, { - "uuid": "a22538e5-aff7-4a20-99c2-f646ecb93c2d", + "uuid": "a9065c9a-9e88-41ba-9330-ffa974dfa215", "control-id": "cis_fedora_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -27077,7 +27169,7 @@ ] }, { - "uuid": "b6ae27bc-fc76-4303-9428-6c6030b8d1b8", + "uuid": "e8556583-82e3-4e0e-9d17-b58d50493f94", "control-id": "cis_fedora_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27094,7 +27186,7 @@ ] }, { - "uuid": "c1f97647-3228-4e24-8bed-4e590ceb8260", + "uuid": "840f7657-ffa3-48b6-85ee-dc55463f36ef", "control-id": "cis_fedora_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27111,7 +27203,7 @@ ] }, { - "uuid": "702cd99e-ccd6-40bf-be99-1f452416faf3", + "uuid": "b59b85c3-c633-4aee-bd77-5c76d71cfa2c", "control-id": "cis_fedora_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -27128,7 +27220,7 @@ ] }, { - "uuid": "74596d97-b64a-4161-96d0-ef36bd9109a0", + "uuid": "c2d5064a-c29b-4297-9177-141f2614a03f", "control-id": "cis_fedora_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27145,7 +27237,7 @@ ] }, { - "uuid": "070f9250-11e1-4303-b43b-996039929612", + "uuid": "e992b416-0923-4621-b742-0329dc407227", "control-id": "cis_fedora_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27162,7 +27254,7 @@ ] }, { - "uuid": "c251302d-878c-4e06-a9f7-43aa25dc8bf6", + "uuid": "e7bd1210-3ae5-4b4d-9702-2ff0f7d9feb1", "control-id": "cis_fedora_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27179,7 +27271,7 @@ ] }, { - "uuid": "94506b99-4556-4fcf-8042-bee1e389e142", + "uuid": "c07dc59e-6387-4d19-979e-3b4fdbe98fc1", "control-id": "cis_fedora_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27196,7 +27288,7 @@ ] }, { - "uuid": "9ac7b996-0469-4e7c-bdc8-b26d7d173f82", + "uuid": "4811c8e2-6715-4a1f-b06d-46810948d109", "control-id": "cis_fedora_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27213,7 +27305,7 @@ ] }, { - "uuid": "7cd7f90d-16a5-458f-a14e-4adf87d04550", + "uuid": "0b03b71d-5325-4a03-b5d6-6417644e9756", "control-id": "cis_fedora_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27230,7 +27322,7 @@ ] }, { - "uuid": "7f00e613-ca2e-43c0-988c-70e5b6aa3dee", + "uuid": "1b71cc44-f14e-4fd1-b9ac-cf186095b78c", "control-id": "cis_fedora_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27247,7 +27339,7 @@ ] }, { - "uuid": "8bf83755-fbc1-4ce1-a056-d599f90c9633", + "uuid": "eb578599-63a2-431c-bbd0-2d65e6661a46", "control-id": "cis_fedora_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27264,7 +27356,7 @@ ] }, { - "uuid": "f9a9a048-676f-44ec-86e0-8e86a7ca10b3", + "uuid": "df280c77-bac5-4100-8a0d-d316a68dc2d3", "control-id": "cis_fedora_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27281,7 +27373,7 @@ ] }, { - "uuid": "571b045e-4d27-4311-a3b6-89683aa18a30", + "uuid": "b3e1c89b-ffbd-4184-98d5-6aed49f30315", "control-id": "cis_fedora_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27298,7 +27390,7 @@ ] }, { - "uuid": "635e1cbf-bb29-42e8-b0cc-595f8fe78210", + "uuid": "ecd78033-826b-4380-a5af-d515b90fabb6", "control-id": "cis_fedora_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27315,7 +27407,7 @@ ] }, { - "uuid": "64f8afc9-9e6b-44e9-9ee2-3b2c23c4b36d", + "uuid": "0010b3db-9574-40bc-9c3a-23bffb488226", "control-id": "cis_fedora_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27332,7 +27424,7 @@ ] }, { - "uuid": "ede7b41f-3abd-4145-8768-d02b73f20603", + "uuid": "65a1dc73-82ee-46d1-b585-df76df685d55", "control-id": "cis_fedora_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27349,7 +27441,7 @@ ] }, { - "uuid": "38c6bdf8-eab9-400e-9276-f5ccab3023b1", + "uuid": "b0716cde-8bf0-4437-9e4f-7cdfaed50805", "control-id": "cis_fedora_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27366,7 +27458,7 @@ ] }, { - "uuid": "880fe649-0889-4050-8130-8d56f4efde38", + "uuid": "6ad21c9c-84b7-4b2d-b5ba-6bc266127561", "control-id": "cis_fedora_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27393,7 +27485,7 @@ ] }, { - "uuid": "58351373-2c2f-4966-b580-401a5f09947a", + "uuid": "eacd7dc8-b58a-4ccd-8cea-0791c5d0b2af", "control-id": "cis_fedora_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27420,7 +27512,7 @@ ] }, { - "uuid": "302c8fb6-740c-46f8-97ee-929d5be7abd5", + "uuid": "0c3173fe-18a7-4bbc-8f23-94a52f453577", "control-id": "cis_fedora_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27447,7 +27539,7 @@ ] }, { - "uuid": "1f2682e6-0d30-4756-8e3e-819b161ed5e9", + "uuid": "caf1f9dc-83c6-49ed-aa85-ba3aa312fe8c", "control-id": "cis_fedora_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27469,7 +27561,7 @@ ] }, { - "uuid": "29cae7cc-f82f-4943-9fbd-292606946fca", + "uuid": "4d5cb2f9-8ac5-4c0f-ab83-547434d38945", "control-id": "cis_fedora_1-8.2", "description": "Review rules to confirm settings are not writeable by users", "props": [ @@ -27486,7 +27578,7 @@ ] }, { - "uuid": "54f41f41-2248-4773-8e47-6687ed3b4076", + "uuid": "13eb4f3e-1899-4bd8-a51c-6899cefcee7f", "control-id": "cis_fedora_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27518,7 +27610,7 @@ ] }, { - "uuid": "a46fc0be-79b6-4ac3-93d7-00272e42cb1c", + "uuid": "60e2120e-d77a-4943-a27b-4753a4a51dca", "control-id": "cis_fedora_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27535,7 +27627,7 @@ ] }, { - "uuid": "1bfac9a4-a696-4320-b821-1a2b1e6f9e65", + "uuid": "24671242-8a88-443e-8752-73a40800f9a4", "control-id": "cis_fedora_1-8.6", "description": "The description for control-id cis_fedora_1-8.6.", "props": [ @@ -27548,7 +27640,7 @@ ] }, { - "uuid": "9a73a5d7-9f2b-442f-99be-b55bc40e70d7", + "uuid": "d0f984b3-d72c-420e-8000-bb3b5b40c0e0", "control-id": "cis_fedora_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27565,7 +27657,7 @@ ] }, { - "uuid": "8768b339-0aca-4d7f-9d83-8660336e54eb", + "uuid": "8f56e5ef-8735-42c5-a99a-ec4ed44b92fd", "control-id": "cis_fedora_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27582,7 +27674,7 @@ ] }, { - "uuid": "e05495be-d2eb-4c25-b2cc-04285ddfcf8d", + "uuid": "f1beb301-0b2b-40ee-b0d2-d267357fd824", "control-id": "cis_fedora_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27599,7 +27691,7 @@ ] }, { - "uuid": "47b7afde-a8f5-4c6f-8528-9ad4c890c1f8", + "uuid": "50108378-26cc-4a8c-b793-46d381eb1656", "control-id": "cis_fedora_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27616,7 +27708,7 @@ ] }, { - "uuid": "117b99d8-3686-4d14-a4d6-0d605bf201a3", + "uuid": "1ee569fd-54fd-40e9-8513-c87ca80c2923", "control-id": "cis_fedora_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27638,7 +27730,7 @@ ] }, { - "uuid": "d66a0e85-e7e4-415a-aaa1-530c74693a5b", + "uuid": "c3ffca47-2140-41b7-a706-f925f08e94c7", "control-id": "cis_fedora_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27655,7 +27747,7 @@ ] }, { - "uuid": "cdbc43b7-d4b2-4f2d-98ea-50e9a9ec8694", + "uuid": "a35c9f27-7119-46bb-ae23-ca333a980e11", "control-id": "cis_fedora_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -27667,7 +27759,7 @@ ] }, { - "uuid": "37d90991-cb8c-47d1-a848-30bc0ff9df50", + "uuid": "a64aee3f-0d5a-4e19-83c6-4f8d6cd2ee16", "control-id": "cis_fedora_2-1.12", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -27684,7 +27776,7 @@ ] }, { - "uuid": "79cc3720-286f-41b2-b2f7-6ad92383f554", + "uuid": "bd0e134c-5f73-4795-9805-cc7204d59040", "control-id": "cis_fedora_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -27701,7 +27793,7 @@ ] }, { - "uuid": "0ae403ba-add8-47eb-bc52-af1877cd34f9", + "uuid": "dbd5ff4e-935a-4641-b06e-5b01e3b866b9", "control-id": "cis_fedora_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -27718,7 +27810,7 @@ ] }, { - "uuid": "f48d077c-94a3-4feb-992e-ce4ae9f00f8e", + "uuid": "3568b609-1e06-4449-be93-d07c5ea235af", "control-id": "cis_fedora_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -27735,7 +27827,7 @@ ] }, { - "uuid": "98032812-c8db-4da9-955d-a64f024f47e9", + "uuid": "e8c03e85-53d2-4902-99b3-def254e4595c", "control-id": "cis_fedora_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -27752,7 +27844,7 @@ ] }, { - "uuid": "b514e9bd-eee5-4ed7-b20f-f986527ee2b8", + "uuid": "f2f31363-2285-4ec5-a075-1f580cee0207", "control-id": "cis_fedora_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -27769,7 +27861,7 @@ ] }, { - "uuid": "0d5fae1f-6a5c-43c6-8d5c-95822f1573fa", + "uuid": "f7793624-6374-4994-a1e3-870ab65c1307", "control-id": "cis_fedora_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -27786,7 +27878,7 @@ ] }, { - "uuid": "ef06a5eb-4806-4cc7-be64-1e0905b902c6", + "uuid": "3416f13c-caad-4da4-8b9f-49e5056532ec", "control-id": "cis_fedora_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -27808,7 +27900,7 @@ ] }, { - "uuid": "d64850b6-3ff5-4ec0-b2a8-ac8cb67d1eb0", + "uuid": "c67ddea1-efcb-456d-9473-a2ed7108fe30", "control-id": "cis_fedora_2-1.20", "description": "The description for control-id cis_fedora_2-1.20.", "props": [ @@ -27821,7 +27913,7 @@ ] }, { - "uuid": "b11596c0-4ad7-46c9-9eba-af2f778eed52", + "uuid": "cb4b1829-8cdb-4e44-ae68-a15bc0852164", "control-id": "cis_fedora_2-1.23", "description": "No notes for control-id 2.1.23.", "props": [ @@ -27843,7 +27935,7 @@ ] }, { - "uuid": "71c1d4d7-5e2d-4ce4-9ae8-28ed4166e5ed", + "uuid": "bdc4f05b-a4a6-4daf-9b8e-c8262c21116b", "control-id": "cis_fedora_2-1.24", "description": "The description for control-id cis_fedora_2-1.24.", "props": [ @@ -27856,7 +27948,7 @@ ] }, { - "uuid": "febd28b6-6450-43ab-ae33-9d022d9b049e", + "uuid": "c7709e91-c5f4-4656-9811-675f76b5699e", "control-id": "cis_fedora_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -27873,7 +27965,7 @@ ] }, { - "uuid": "079d6eb3-35cf-4234-a072-4b17815108c4", + "uuid": "e9bd9bf5-a4a2-416d-a8b7-7a74d08c1370", "control-id": "cis_fedora_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -27885,7 +27977,7 @@ ] }, { - "uuid": "9d185e4e-2976-421f-8562-dd8f3ea4a235", + "uuid": "39f60712-7fae-427e-a8b4-fe6a247db6e1", "control-id": "cis_fedora_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -27902,7 +27994,7 @@ ] }, { - "uuid": "8eb76a96-ad2c-445f-8de1-b18ce9daa7f5", + "uuid": "19a2c4fe-4c3b-4d82-84cb-a6ca22aeb3e4", "control-id": "cis_fedora_2-2.5", "description": "No notes for control-id 2.2.5.", "props": [ @@ -27919,7 +28011,7 @@ ] }, { - "uuid": "e1980efc-aa58-480e-a9fb-cea4ec02ac83", + "uuid": "f126d069-203f-41bb-9802-01ce6614566a", "control-id": "cis_fedora_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -27931,7 +28023,7 @@ ] }, { - "uuid": "52321a79-07aa-49aa-8966-2c541dcf90a1", + "uuid": "1ea3167f-5ab7-494a-aa04-b1a2d09159df", "control-id": "cis_fedora_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -27948,7 +28040,7 @@ ] }, { - "uuid": "86c2125c-77fe-4780-9194-5f701da05c36", + "uuid": "80ac9031-ab2e-494b-b2eb-9369edc8eaea", "control-id": "cis_fedora_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -27965,7 +28057,7 @@ ] }, { - "uuid": "639d3fff-3c7a-4a04-925d-89e65f10bac1", + "uuid": "f5ff0d2f-455f-482e-b681-0c3fa4ffa415", "control-id": "cis_fedora_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -27987,7 +28079,7 @@ ] }, { - "uuid": "399a248d-42c2-4183-aab7-9096b5944984", + "uuid": "ca4f34bf-38f3-4f89-9f90-31d65addec10", "control-id": "cis_fedora_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28014,7 +28106,7 @@ ] }, { - "uuid": "db1ec80c-ccb4-40c5-96ad-5f433840045b", + "uuid": "6fb4cbd1-cc9a-4fa7-aae9-46949299ff46", "control-id": "cis_fedora_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28041,7 +28133,7 @@ ] }, { - "uuid": "01a542f5-8adc-4f48-8cdc-5702fb3f6955", + "uuid": "6c4c766e-476c-4d8a-9418-2a8053686f79", "control-id": "cis_fedora_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28068,7 +28160,7 @@ ] }, { - "uuid": "556e9197-7458-4003-a9b3-5c278cb7cc61", + "uuid": "9eca3fa7-d33c-400a-ade4-75eb9c625b67", "control-id": "cis_fedora_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28095,7 +28187,7 @@ ] }, { - "uuid": "cb815c37-135b-4681-a13d-f968b698285f", + "uuid": "8bcd0461-ca0a-4855-8ab7-df7a05370840", "control-id": "cis_fedora_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28122,7 +28214,7 @@ ] }, { - "uuid": "39c61e76-18a0-479b-8054-9a09f93d5278", + "uuid": "74cb9db6-d4e1-4a85-96bf-2855bcac8002", "control-id": "cis_fedora_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28149,7 +28241,7 @@ ] }, { - "uuid": "362f0c56-03bd-4c7d-ada0-bb07fbdad401", + "uuid": "329549f8-c772-44ac-89ce-ac2ffb2b5aa7", "control-id": "cis_fedora_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28176,7 +28268,7 @@ ] }, { - "uuid": "69869044-6155-43da-9785-86ba80f11709", + "uuid": "956f3504-c23c-47a9-a9a5-be384c3763c5", "control-id": "cis_fedora_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28213,7 +28305,7 @@ ] }, { - "uuid": "f3c885b0-09bd-4057-a42b-f2d6bf5f40fc", + "uuid": "e691e86f-bba6-4ad2-bdc5-0bc376b54249", "control-id": "cis_fedora_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28250,7 +28342,7 @@ ] }, { - "uuid": "4b0cae19-73df-4eb6-ba41-8f96b839de67", + "uuid": "0d26e72a-87b0-4b0c-aa0f-2e8a974d337b", "control-id": "cis_fedora_3-1.1", "description": "The description for control-id cis_fedora_3-1.1.", "props": [ @@ -28263,7 +28355,7 @@ ] }, { - "uuid": "472b798e-c6e0-4721-99c2-7b6d0d5d114f", + "uuid": "72df578e-37c3-41ea-8dbe-8609d808b48e", "control-id": "cis_fedora_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28280,7 +28372,7 @@ ] }, { - "uuid": "294c17dc-52dd-4b28-a2f8-b97990ef1b4f", + "uuid": "d7956ed9-28d2-4de8-86c9-851db18cac94", "control-id": "cis_fedora_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28297,7 +28389,7 @@ ] }, { - "uuid": "1c861af7-1b95-42fc-b94f-beb709d115cc", + "uuid": "a6664ec4-10a2-40a8-9fef-b03758217686", "control-id": "cis_fedora_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28314,7 +28406,7 @@ ] }, { - "uuid": "62af6aa7-dc8b-4f9e-a275-06cf2be49ecd", + "uuid": "fb9a6af2-f817-48c6-8c2b-2273a8a07658", "control-id": "cis_fedora_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28331,7 +28423,7 @@ ] }, { - "uuid": "1e50dd7d-9539-4835-be9a-782b620f6830", + "uuid": "0d4e5a38-0b57-42c6-a36a-09d2b256c59b", "control-id": "cis_fedora_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28348,7 +28440,7 @@ ] }, { - "uuid": "90dc2287-bfef-4e6e-b99d-14874aba5810", + "uuid": "1e162831-853f-401f-81b4-32d9e432c08d", "control-id": "cis_fedora_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -28365,7 +28457,7 @@ ] }, { - "uuid": "8bf7a4e6-9c87-43ba-b54f-1b2e9f20ab63", + "uuid": "eb2343c6-9b31-4f2e-8bde-d3d2d0f34228", "control-id": "cis_fedora_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28382,7 +28474,7 @@ ] }, { - "uuid": "9b47f01d-5c91-40d0-b4d1-f4b4b5d84e18", + "uuid": "a6c5edf6-1e75-4f7a-9e83-ae6e365767c8", "control-id": "cis_fedora_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28399,7 +28491,7 @@ ] }, { - "uuid": "26670351-6d9c-4d02-a326-355a465afa3e", + "uuid": "1e24cd54-b372-4463-80df-c67623a05fc8", "control-id": "cis_fedora_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28416,7 +28508,7 @@ ] }, { - "uuid": "bee70d5a-8263-4378-8454-3217138cb864", + "uuid": "c4b946ef-078c-4347-94ff-d33810f9da47", "control-id": "cis_fedora_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28433,7 +28525,7 @@ ] }, { - "uuid": "bdc6bc58-72cf-4e2a-a9cb-529222dd31b7", + "uuid": "d5138107-caa5-4d18-aa1a-a5ac20a6489c", "control-id": "cis_fedora_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28450,7 +28542,7 @@ ] }, { - "uuid": "58643f67-7588-4148-8366-0b98904f95da", + "uuid": "fab489a5-17c4-4631-99f0-6d1026546d91", "control-id": "cis_fedora_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28467,7 +28559,7 @@ ] }, { - "uuid": "226b1759-90fb-4580-a8aa-1b31f2485efa", + "uuid": "661443ca-6bea-4b6a-a07b-9e728548e054", "control-id": "cis_fedora_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28484,7 +28576,7 @@ ] }, { - "uuid": "25e449a4-7261-43d3-91fc-a6da955e1117", + "uuid": "38f98190-f3da-4bf6-97cd-b64fad116c57", "control-id": "cis_fedora_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28501,7 +28593,7 @@ ] }, { - "uuid": "23eab85c-1ef1-49c4-8c3a-a491bbda791d", + "uuid": "ca9a00ca-ceb5-46ea-aebe-909f4a1e0f56", "control-id": "cis_fedora_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28518,7 +28610,7 @@ ] }, { - "uuid": "97b8079f-350d-4fb4-bb54-786557c60d84", + "uuid": "9e18738c-6e3a-43ba-bb9a-03922cad32f5", "control-id": "cis_fedora_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28535,7 +28627,7 @@ ] }, { - "uuid": "299ac83d-4313-4508-a4fd-d725d38c75e0", + "uuid": "d611cb48-fc56-40a2-a5ea-6abc5820f877", "control-id": "cis_fedora_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28552,7 +28644,7 @@ ] }, { - "uuid": "e489d07e-7d28-4d4d-8a14-a0d11daabe55", + "uuid": "14d92a5e-37d8-448e-8e61-2ad09a803406", "control-id": "cis_fedora_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28569,7 +28661,7 @@ ] }, { - "uuid": "c1f13fcb-1918-4112-a52c-eaf58370684f", + "uuid": "ac862f13-b81f-484b-8969-32c727d0daaf", "control-id": "cis_fedora_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28586,7 +28678,7 @@ ] }, { - "uuid": "b41b17cd-5011-44ed-ada6-4a2f4f4ef0c0", + "uuid": "b6191909-b6bd-44d0-acc4-4a64920c3a75", "control-id": "cis_fedora_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28603,7 +28695,7 @@ ] }, { - "uuid": "a09a7567-2b40-4b43-a094-e4a897561f97", + "uuid": "e928215d-fc20-4593-91ba-6bb4d37ff43f", "control-id": "cis_fedora_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28620,7 +28712,7 @@ ] }, { - "uuid": "4e5f63a3-799c-4c49-86c4-4ac694de37a9", + "uuid": "71a096a6-e212-4d76-8025-a042167f665a", "control-id": "cis_fedora_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28637,7 +28729,7 @@ ] }, { - "uuid": "a2902406-bc6b-48b8-b7e3-f790705ad70c", + "uuid": "99789430-6b21-4d9e-a485-6335affd79bd", "control-id": "cis_fedora_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28654,7 +28746,7 @@ ] }, { - "uuid": "cc934f96-a42e-4500-887a-8741985d2c1c", + "uuid": "75593da0-ed96-48d3-ba60-1157ee127ad8", "control-id": "cis_fedora_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -28671,7 +28763,7 @@ ] }, { - "uuid": "d3314478-3251-421e-aaaf-0070e30ea83a", + "uuid": "73698b1e-baf7-4df8-8de7-4091e21421c3", "control-id": "cis_fedora_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -28688,7 +28780,7 @@ ] }, { - "uuid": "fa02f692-fee5-45b3-b33d-9fc6b76fde3b", + "uuid": "fcdd2f2a-5f86-4b5e-bce4-64ba10654c11", "control-id": "cis_fedora_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -28705,7 +28797,7 @@ ] }, { - "uuid": "2308dfa7-abfc-4714-8774-9ba1ad3f652b", + "uuid": "173d1351-43ce-47a8-ac4f-d20efd0854ba", "control-id": "cis_fedora_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -28722,7 +28814,7 @@ ] }, { - "uuid": "bcb19612-9dd6-486a-b3aa-35843d8c77ba", + "uuid": "9a3a2d81-ef4b-421b-95fe-1f5bd793e0da", "control-id": "cis_fedora_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -28739,7 +28831,7 @@ ] }, { - "uuid": "f4267d9c-4637-43df-b937-b7292ef053d8", + "uuid": "9fad3634-88fd-406e-9752-96d8adcade9d", "control-id": "cis_fedora_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -28756,7 +28848,7 @@ ] }, { - "uuid": "181cc06e-921a-48b6-8229-8679667020cd", + "uuid": "a7989f9f-1c0c-4256-8c5a-bd3ee5ad3b5a", "control-id": "cis_fedora_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -28773,7 +28865,7 @@ ] }, { - "uuid": "b458b92d-670a-424d-948d-605e9f7455a1", + "uuid": "27bf2013-1355-4de9-a681-de8076067054", "control-id": "cis_fedora_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -28790,7 +28882,7 @@ ] }, { - "uuid": "73ebfca9-f155-4453-8422-e7ffd286c012", + "uuid": "687900f5-32dd-4c8a-8253-ed025dd74e7f", "control-id": "cis_fedora_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -28807,7 +28899,7 @@ ] }, { - "uuid": "7bf201b0-dd49-4dfc-b314-775c88bd5fe6", + "uuid": "b32d3bf1-c935-4ab2-b4f2-8dccc6ace50d", "control-id": "cis_fedora_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -28834,7 +28926,7 @@ ] }, { - "uuid": "d991e59e-b3a0-4112-9b67-e123317b4cda", + "uuid": "bf4252b4-1a7c-4575-88a6-f91f235fd441", "control-id": "cis_fedora_4-2.1", "description": "The description for control-id cis_fedora_4-2.1.", "props": [ @@ -28847,7 +28939,7 @@ ] }, { - "uuid": "2ec02e82-aa8e-4681-a257-e5d0e29ec755", + "uuid": "8e1b94ba-57c3-4124-8a8d-a4c0d9f11a64", "control-id": "cis_fedora_4-2.2", "description": "No notes for control-id 4.2.2.", "props": [ @@ -28869,7 +28961,7 @@ ] }, { - "uuid": "f5386671-9d72-49a1-b1f3-9dc967ee2e73", + "uuid": "0b524ec4-3cb9-45c1-9641-6c61607e739e", "control-id": "cis_fedora_4-3.1", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use. When using firewalld the base chains are installed by default.", "props": [ @@ -28881,7 +28973,7 @@ ] }, { - "uuid": "30520596-84e9-41f3-afd5-75aa2fbd2598", + "uuid": "cb96302f-792b-46b0-b4c7-f6df9730f0a6", "control-id": "cis_fedora_4-3.2", "description": "The description for control-id cis_fedora_4-3.2.", "props": [ @@ -28894,7 +28986,7 @@ ] }, { - "uuid": "0ff500f2-fb31-4eba-9ef3-c03ff3b58a08", + "uuid": "ca73a575-676d-4d75-9f45-219e34317831", "control-id": "cis_fedora_4-3.3", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -28906,7 +28998,7 @@ ] }, { - "uuid": "a2c42ac4-0ab3-48d2-80f3-455976b75a8c", + "uuid": "e269e14e-b2d2-41c9-aabc-b40007e4cc5b", "control-id": "cis_fedora_4-3.4", "description": "RHEL systems use firewalld for firewall management. Although nftables is the default\nback-end for firewalld, it is not recommended to use nftables directly when firewalld\nis in use.", "props": [ @@ -28918,7 +29010,7 @@ ] }, { - "uuid": "2e70ef93-e6ce-4864-887b-e9fa60e2e5a3", + "uuid": "9dec7591-0a8d-4cc3-a296-0e7113b2bea3", "control-id": "cis_fedora_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -28975,7 +29067,7 @@ ] }, { - "uuid": "5e9f0214-500b-4203-964d-c5ae50b0ceae", + "uuid": "c6f1e5c0-1607-4c5f-ab7b-33952ff1a873", "control-id": "cis_fedora_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29002,7 +29094,7 @@ ] }, { - "uuid": "c1b09e49-b05f-4e56-84d3-a262f8a5ca9f", + "uuid": "ae47a087-4595-4103-a9c3-6eadf0c00657", "control-id": "cis_fedora_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29029,7 +29121,7 @@ ] }, { - "uuid": "4544b107-a045-4c70-b6fd-b5ce41bc8e1b", + "uuid": "bd26546a-ef9f-4a9b-9137-9a3c1211db71", "control-id": "cis_fedora_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29046,7 +29138,7 @@ ] }, { - "uuid": "2bb0eeb6-13e6-4f57-a5df-bbf46a363a78", + "uuid": "ae8bb985-44e8-4e34-b99d-c6e3fd580c73", "control-id": "cis_fedora_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29063,7 +29155,7 @@ ] }, { - "uuid": "f3c3783e-8def-420c-99d7-d09ccc337569", + "uuid": "b99931e1-e9f1-415f-a74f-fdb6de76caff", "control-id": "cis_fedora_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29080,7 +29172,7 @@ ] }, { - "uuid": "29e73d62-8239-48ab-b6f0-b3a638375c6d", + "uuid": "eff5cd33-d8d0-4bf1-80f7-ab54ac07fae3", "control-id": "cis_fedora_5-1.7", "description": "No notes for control-id 5.1.7.", "props": [ @@ -29097,7 +29189,7 @@ ] }, { - "uuid": "2ab4f9b0-7b98-4d7a-a5d9-d9ae368f710b", + "uuid": "a86075bd-6140-460a-aa78-b9f34c4043e6", "control-id": "cis_fedora_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -29114,7 +29206,7 @@ ] }, { - "uuid": "13fe09c6-cdcb-4cfb-81e2-22c91169c206", + "uuid": "5d91ab0b-9365-4010-8781-aefb9273e4e9", "control-id": "cis_fedora_5-1.9", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29136,7 +29228,7 @@ ] }, { - "uuid": "0eee1dd2-b7ed-4ac8-b95c-9da8147a2974", + "uuid": "88f8b849-9eee-40ed-9e2c-1ba0760635dd", "control-id": "cis_fedora_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29153,7 +29245,7 @@ ] }, { - "uuid": "24f05925-cf8b-4f1c-8037-99e9d7917e32", + "uuid": "e627ba80-368e-42d7-992b-b8c7b5e1e9b1", "control-id": "cis_fedora_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29170,7 +29262,7 @@ ] }, { - "uuid": "95872c3c-d6d5-4299-a77e-ce5bb7876018", + "uuid": "30175625-358b-4c4a-973d-a94cc781d9f9", "control-id": "cis_fedora_5-1.12", "description": "No notes for control-id 5.1.12.", "props": [ @@ -29187,7 +29279,7 @@ ] }, { - "uuid": "1ba1627a-501c-4505-95d5-d320b6e58da3", + "uuid": "25a6ed2a-1e4e-4ba0-a231-4507c67797ad", "control-id": "cis_fedora_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29204,7 +29296,7 @@ ] }, { - "uuid": "5a3dced4-164d-464d-90f7-6843a275ac12", + "uuid": "39b9e3b8-9ca2-4087-8359-223be304cb8d", "control-id": "cis_fedora_5-1.14", "description": "No notes for control-id 5.1.14.", "props": [ @@ -29221,7 +29313,7 @@ ] }, { - "uuid": "d343c33f-cac0-4829-a823-d13ed762e0a9", + "uuid": "09baa754-09e0-40d5-baed-ddbddd83f4d7", "control-id": "cis_fedora_5-1.15", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29238,7 +29330,7 @@ ] }, { - "uuid": "0d63bfa3-3d25-40e4-855f-fa1d5d5fdcf5", + "uuid": "a793a434-c20f-42f2-a03a-b3de61b35083", "control-id": "cis_fedora_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29255,7 +29347,7 @@ ] }, { - "uuid": "c6ecaf6e-00dc-4a19-9eaf-d1d0004556e6", + "uuid": "55f99707-c9cb-44a5-9a11-8b1e19850694", "control-id": "cis_fedora_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29272,7 +29364,7 @@ ] }, { - "uuid": "035d3cf4-8a6e-4afe-ae3c-49a05253d387", + "uuid": "c33f21d6-daf0-4d40-aa32-436a6cd7758e", "control-id": "cis_fedora_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29289,7 +29381,7 @@ ] }, { - "uuid": "cecb3188-3c82-46c2-87c7-cbc88b3d492d", + "uuid": "e0465790-7ef8-4bf5-a010-42e3db485752", "control-id": "cis_fedora_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29306,7 +29398,7 @@ ] }, { - "uuid": "8ebafb8c-5335-4739-b872-e94cfb2abebb", + "uuid": "bb7883b9-bdbb-41a3-8212-b02d0fb223a5", "control-id": "cis_fedora_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29323,7 +29415,7 @@ ] }, { - "uuid": "592658c9-2f09-4089-9407-80205abd8732", + "uuid": "f4e48405-407a-4ff7-9779-7c931a643a99", "control-id": "cis_fedora_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29340,7 +29432,7 @@ ] }, { - "uuid": "ffbc4ee3-5573-4cc3-b516-e5f326bbe47d", + "uuid": "19f58853-dd36-4397-b939-7e5530d4462c", "control-id": "cis_fedora_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29357,7 +29449,7 @@ ] }, { - "uuid": "8b760887-9d05-40ff-bb34-d2d274f8c7ad", + "uuid": "1a670d77-c973-471e-af48-bbd888bee5db", "control-id": "cis_fedora_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29374,7 +29466,7 @@ ] }, { - "uuid": "19958e20-7084-4a5d-a701-c1bc3c6cdda0", + "uuid": "53f06867-87ac-4a49-8909-1a812a316044", "control-id": "cis_fedora_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29391,7 +29483,7 @@ ] }, { - "uuid": "fbd06439-1c39-4a5d-a217-f0f9431253cd", + "uuid": "721bb63a-1a59-4fb4-a4b3-5820d67f6814", "control-id": "cis_fedora_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29408,7 +29500,7 @@ ] }, { - "uuid": "e122a0fb-7317-4b8e-9a29-5a1a74e9634c", + "uuid": "557a4b3a-2b84-48e4-9fee-cb7e1d8f8d9b", "control-id": "cis_fedora_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29425,7 +29517,7 @@ ] }, { - "uuid": "1ee60ebd-c47f-4a91-bd1a-004f451f6de2", + "uuid": "107babf0-7d69-410c-afd4-169d19ef6ba3", "control-id": "cis_fedora_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29442,7 +29534,7 @@ ] }, { - "uuid": "58c05bf2-9257-4789-a29a-b148026c0908", + "uuid": "24694ca9-d76e-4afc-bb41-20801677e962", "control-id": "cis_fedora_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29464,7 +29556,7 @@ ] }, { - "uuid": "20462b3e-5ede-4b3a-a63d-8a3a719357b8", + "uuid": "751e7f86-b5ff-4e27-80f8-eeccbcd81c3b", "control-id": "cis_fedora_5-3.1.1", "description": "The description for control-id cis_fedora_5-3.1.1.", "props": [ @@ -29477,7 +29569,7 @@ ] }, { - "uuid": "c0979758-8a69-4755-9fda-fae1e74570c8", + "uuid": "cf78249b-d05a-410e-bea1-adcaee47c865", "control-id": "cis_fedora_5-3.1.2", "description": "The description for control-id cis_fedora_5-3.1.2.", "props": [ @@ -29490,7 +29582,7 @@ ] }, { - "uuid": "cccb4d48-d513-489b-adc3-eb0929c2c6b5", + "uuid": "e94c76b1-e8fd-4350-afd5-090fcccb51e3", "control-id": "cis_fedora_5-3.1.3", "description": "The description for control-id cis_fedora_5-3.1.3.", "props": [ @@ -29508,7 +29600,7 @@ ] }, { - "uuid": "9f19e36d-686a-48a5-bd90-2f5a8c9a0c56", + "uuid": "46530ec7-3a33-4436-95b6-6e7f37887b6f", "control-id": "cis_fedora_5-3.2.1", "description": "This rule verifies that the active authselect profile includes the required PAM modules:\npam_pwquality.so, pam_pwhistory.so, pam_faillock.so, and pam_unix.so in both system-auth\nand password-auth files. The rule checks the authselect profile source files directly,\nnot the symlinked files in /etc/pam.d/. Other rules ensure these modules are properly\nconfigured with correct options.", "props": [ @@ -29525,7 +29617,7 @@ ] }, { - "uuid": "445a6753-761a-4695-bd09-46d3b002aa27", + "uuid": "a178f18b-59e9-4637-afb3-ee3db0e2586b", "control-id": "cis_fedora_5-3.2.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.1.", "props": [ @@ -29547,7 +29639,7 @@ ] }, { - "uuid": "cb2ca7ca-24a5-4460-98ca-dd817e81e737", + "uuid": "882765c3-cc1c-40a4-9bd0-f57a52f8f333", "control-id": "cis_fedora_5-3.2.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.3.2.", "props": [ @@ -29574,7 +29666,7 @@ ] }, { - "uuid": "ff23569b-ed26-458f-966d-4ec0741c7805", + "uuid": "7ae7925a-62f4-468f-a7ec-a6cfa3b814cd", "control-id": "cis_fedora_5-3.2.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.3.3 use these rules.", "props": [ @@ -29586,7 +29678,7 @@ ] }, { - "uuid": "6b5d29f5-3588-44a1-b4bf-ed29e9d162ed", + "uuid": "448c040c-d903-4ef7-9b02-3306476baf3d", "control-id": "cis_fedora_5-3.2.5", "description": "No notes for control-id 5.3.2.5.", "props": [ @@ -29603,7 +29695,7 @@ ] }, { - "uuid": "084fc1c0-2c60-4346-aa18-d9a6a32b2d93", + "uuid": "bed519af-7e54-48d0-880a-b94fbe3f2641", "control-id": "cis_fedora_5-3.3.1.1", "description": "No notes for control-id 5.3.3.1.1.", "props": [ @@ -29620,7 +29712,7 @@ ] }, { - "uuid": "6987f478-902b-44ca-9b7d-bf5bc60fd51d", + "uuid": "cd54c037-84d1-4ea0-a732-4f8cd9199b97", "control-id": "cis_fedora_5-3.3.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29637,7 +29729,7 @@ ] }, { - "uuid": "a913ccbf-b6ad-4d5c-acd8-e5191ae85e9d", + "uuid": "abed2289-cacc-4034-b560-5c5be1a347a8", "control-id": "cis_fedora_5-3.3.2.1", "description": "No notes for control-id 5.3.3.2.1.", "props": [ @@ -29654,7 +29746,7 @@ ] }, { - "uuid": "0c1cdc24-eb74-45b3-a862-fef98f06456e", + "uuid": "c58f2838-62e0-48c8-981c-4e72bd97322f", "control-id": "cis_fedora_5-3.3.2.2", "description": "No notes for control-id 5.3.3.2.2.", "props": [ @@ -29671,7 +29763,7 @@ ] }, { - "uuid": "35de5c53-dd4c-4670-bae9-8df5cd9cc48a", + "uuid": "1b83b528-4baf-4ae4-9e39-ee2bec2b4cd8", "control-id": "cis_fedora_5-3.3.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. Rules related to other\noptions are informed in related_rules. In short, minclass=4 alone can achieve the same\nresult achieved by the combination of the other 4 options mentioned in the policy.", "props": [ @@ -29688,7 +29780,7 @@ ] }, { - "uuid": "6d6b0b21-13b8-4580-bd16-aefc537e3923", + "uuid": "82563744-4386-472e-bfee-aa383271ee9b", "control-id": "cis_fedora_5-3.3.2.4", "description": "No notes for control-id 5.3.3.2.4.", "props": [ @@ -29705,7 +29797,7 @@ ] }, { - "uuid": "487b48df-d61f-47b1-a682-2760c6c14563", + "uuid": "0f2a2925-498d-48a5-b306-382e05aaf389", "control-id": "cis_fedora_5-3.3.2.5", "description": "No notes for control-id 5.3.3.2.5.", "props": [ @@ -29722,7 +29814,7 @@ ] }, { - "uuid": "874c7423-e9b3-4ba3-9df2-64c7623ed7a7", + "uuid": "ecfcac4b-c616-4f67-9932-af86e23b3993", "control-id": "cis_fedora_5-3.3.2.6", "description": "No notes for control-id 5.3.3.2.6.", "props": [ @@ -29739,7 +29831,7 @@ ] }, { - "uuid": "d5549431-9858-4747-a15c-7e0ff15f5bbd", + "uuid": "2848527f-0c6b-434e-b046-8fae368f2610", "control-id": "cis_fedora_5-3.3.2.7", "description": "No notes for control-id 5.3.3.2.7.", "props": [ @@ -29756,7 +29848,7 @@ ] }, { - "uuid": "6ba29fde-f3e9-425a-aaf0-1f07c3360b4c", + "uuid": "1e680a53-b4c2-4dd9-8037-eebeffa067be", "control-id": "cis_fedora_5-3.3.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -29778,7 +29870,7 @@ ] }, { - "uuid": "c3bef3e6-db61-47e6-a2b9-b0a0024cb87c", + "uuid": "6b02275b-a712-411f-9332-b62a91d5b234", "control-id": "cis_fedora_5-3.3.3.2", "description": "The description for control-id cis_fedora_5-3.3.3.2.", "props": [ @@ -29791,7 +29883,7 @@ ] }, { - "uuid": "529adbba-ae5b-42da-97ac-8c438f7a6407", + "uuid": "a313fbe8-9fb9-4798-87bc-74add170c94d", "control-id": "cis_fedora_5-3.3.3.3", "description": "pam_pwhistory is enabled via authselect feature, as required in 5.3.2.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -29808,7 +29900,7 @@ ] }, { - "uuid": "2765c162-e787-4280-a48d-bc4838fb7d44", + "uuid": "d5dd0293-d12b-458b-9a6a-d91bd8d45e47", "control-id": "cis_fedora_5-3.3.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.2.5.", "props": [ @@ -29825,7 +29917,7 @@ ] }, { - "uuid": "28bdc179-2492-4f5d-954f-d3f8a3e7bf78", + "uuid": "5a1be3e7-5c26-4ac3-b37c-2450fcc25021", "control-id": "cis_fedora_5-3.3.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommened by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.3.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -29842,7 +29934,7 @@ ] }, { - "uuid": "67ea897c-f7d6-4661-a3b8-59098b157b27", + "uuid": "f4937470-2420-47b8-b35d-3361dbef2933", "control-id": "cis_fedora_5-3.3.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -29864,7 +29956,7 @@ ] }, { - "uuid": "a6c47c52-591e-4074-8a3d-378725c3c9c7", + "uuid": "d0e6f102-04f9-43f8-965a-4f5c4b64b5ad", "control-id": "cis_fedora_5-3.3.4.4", "description": "In RHEL 9 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.3.3.3.", "props": [ @@ -29881,7 +29973,7 @@ ] }, { - "uuid": "b5f14f3a-02d6-46c0-8f4c-2d71b0d9d179", + "uuid": "2df20fd6-7b6b-4f9c-a962-43a6b5eb0401", "control-id": "cis_fedora_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -29903,7 +29995,7 @@ ] }, { - "uuid": "bc386c19-c7c8-4b96-914f-ef48294627f9", + "uuid": "3d6612e3-91af-4025-8036-29eea9f5b11b", "control-id": "cis_fedora_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -29925,7 +30017,7 @@ ] }, { - "uuid": "803fd066-4c30-491a-84bc-23a874c59079", + "uuid": "0a5e4b47-dd1d-449b-a21d-f4aa8a975e0f", "control-id": "cis_fedora_5-4.1.4", "description": "No notes for control-id 5.4.1.4.", "props": [ @@ -29942,7 +30034,7 @@ ] }, { - "uuid": "77677c81-9b6d-4516-9170-add94bcd0594", + "uuid": "ad218855-8f24-4fe9-937d-6b21675bbbde", "control-id": "cis_fedora_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -29964,7 +30056,7 @@ ] }, { - "uuid": "f3d334ef-cd1b-4a19-8205-f2f281e8a26e", + "uuid": "667404e8-e271-4397-b43e-9f3a5169c5fa", "control-id": "cis_fedora_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -29981,7 +30073,7 @@ ] }, { - "uuid": "ad728e2b-376a-4cb4-8d09-b5bfb2abc77b", + "uuid": "35b003f3-fc70-44b0-9adc-f8c88dbba2f0", "control-id": "cis_fedora_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -29998,7 +30090,7 @@ ] }, { - "uuid": "cecf5ba0-97ca-4669-a423-08dc19a17af0", + "uuid": "92344a32-e830-46ef-991b-ce0d4be9f13a", "control-id": "cis_fedora_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30015,7 +30107,7 @@ ] }, { - "uuid": "1dcbc60d-2a5f-46cb-9343-575c691a983d", + "uuid": "3fcf8475-e46f-4a26-a564-92189863ffd7", "control-id": "cis_fedora_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30032,7 +30124,7 @@ ] }, { - "uuid": "ec13d57f-316e-4eeb-bbaf-84940221aa47", + "uuid": "2deece3d-010a-41c3-851b-028bca42ba08", "control-id": "cis_fedora_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30049,7 +30141,7 @@ ] }, { - "uuid": "7dfe0c7d-796b-411e-b4f7-86d040f76834", + "uuid": "fb250069-4a8f-4649-bca0-0651819725ab", "control-id": "cis_fedora_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30071,7 +30163,7 @@ ] }, { - "uuid": "ec87853a-008d-4e54-ba3a-10d20b0a7b02", + "uuid": "1fe2cccb-cf1a-457d-8646-6636dab019e6", "control-id": "cis_fedora_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30088,7 +30180,7 @@ ] }, { - "uuid": "d37978b7-1d0e-4c9a-b5f1-464d5cbeeedb", + "uuid": "e6fc2da4-f1ee-433b-8d5a-7358ba9c335d", "control-id": "cis_fedora_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30110,7 +30202,7 @@ ] }, { - "uuid": "97e8bc49-4193-44cb-9045-0cd8ddf6618d", + "uuid": "5f5c874d-09fb-4823-8b50-af565df33617", "control-id": "cis_fedora_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30127,7 +30219,7 @@ ] }, { - "uuid": "7fa2fa0e-32aa-406e-b1f2-bcfd52ef9b30", + "uuid": "a35761b3-9f48-417d-91cb-498e7adaf40f", "control-id": "cis_fedora_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30144,7 +30236,7 @@ ] }, { - "uuid": "d8be3dce-5a30-43bf-8a06-64d82f50206a", + "uuid": "cb6aeb0a-5841-4960-9ef6-dca52b80758d", "control-id": "cis_fedora_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30171,7 +30263,7 @@ ] }, { - "uuid": "6c85d928-5a90-4bdf-9f5b-d38e8b0004df", + "uuid": "01df4e69-6717-4e32-96f2-57cce1f0925b", "control-id": "cis_fedora_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30193,7 +30285,7 @@ ] }, { - "uuid": "0c8ad242-8628-4982-8c70-ea2b6108495d", + "uuid": "6cf9883d-75fc-434f-8a75-e46fdfba7a57", "control-id": "cis_fedora_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30210,7 +30302,7 @@ ] }, { - "uuid": "bda1c6c2-e2bb-4134-8a72-733551fa40e0", + "uuid": "7fb4243b-6089-4e4d-802b-7bf151f80ee2", "control-id": "cis_fedora_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30227,7 +30319,7 @@ ] }, { - "uuid": "01d19fa9-de8b-4019-9d3e-365e397f0d0c", + "uuid": "529b25cf-2804-4a48-a71c-6ce20bf96ecc", "control-id": "cis_fedora_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30244,7 +30336,7 @@ ] }, { - "uuid": "6f8b7411-6978-40f8-9146-c3c1cf30e8d3", + "uuid": "7e29c878-acf8-4b7f-93e7-b32765a034a4", "control-id": "cis_fedora_6-2.1.2", "description": "The description for control-id cis_fedora_6-2.1.2.", "props": [ @@ -30257,7 +30349,7 @@ ] }, { - "uuid": "7e113f92-87cf-4051-acaf-8bcd8a7f1c8d", + "uuid": "e2bf17d8-14d7-4d74-bed3-9634794ea250", "control-id": "cis_fedora_6-2.1.3", "description": "The description for control-id cis_fedora_6-2.1.3.", "props": [ @@ -30270,7 +30362,7 @@ ] }, { - "uuid": "7d2ba8da-f273-4f3e-bb14-8e6ed06e46ac", + "uuid": "05b6cb37-7dcc-4b34-8753-558cc321bf39", "control-id": "cis_fedora_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30287,7 +30379,7 @@ ] }, { - "uuid": "ccecacbb-fd1a-40e8-ab53-52fac6c48e82", + "uuid": "05148556-d493-4d0f-a3dd-f6b4611853d9", "control-id": "cis_fedora_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30304,7 +30396,7 @@ ] }, { - "uuid": "aa4742e6-be48-4c29-909d-31dd042abef6", + "uuid": "74f457c6-cde2-43bd-bea5-0738addf6e6d", "control-id": "cis_fedora_6-2.2.1.2", "description": "The description for control-id cis_fedora_6-2.2.1.2.", "props": [ @@ -30317,7 +30409,7 @@ ] }, { - "uuid": "9efe79bd-7696-4193-9320-339f793e4fa4", + "uuid": "5293e924-5d96-4c8e-b68e-6c1db1b8fca0", "control-id": "cis_fedora_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30334,7 +30426,7 @@ ] }, { - "uuid": "22080faf-53ab-4cea-ab26-fabdf1680a5e", + "uuid": "20f175e8-50af-4493-8f17-c960421e3640", "control-id": "cis_fedora_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30351,7 +30443,7 @@ ] }, { - "uuid": "c7e26252-9092-45c7-afde-d35ea2cfe95f", + "uuid": "cf62f5a6-fd51-4071-8618-c63b866d36dc", "control-id": "cis_fedora_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30368,7 +30460,7 @@ ] }, { - "uuid": "65add7d2-2820-495c-bb5b-ff1d42e695e9", + "uuid": "b2f30bdd-aef2-4540-bb16-ea5fb71d5534", "control-id": "cis_fedora_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30385,7 +30477,7 @@ ] }, { - "uuid": "3541d81c-0a58-4207-b77b-e0cc0814120e", + "uuid": "633fe6bf-42dc-4e6c-b3d0-a8f6a5b334f7", "control-id": "cis_fedora_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30402,7 +30494,7 @@ ] }, { - "uuid": "90e66138-75d6-4c60-99f8-c419b35f260a", + "uuid": "a252465d-cc32-4184-8d8e-a51b57ed79b0", "control-id": "cis_fedora_6-2.5.1", "description": "No notes for control-id 6.2.5.1.", "props": [ @@ -30414,7 +30506,7 @@ ] }, { - "uuid": "69b19452-2f83-45fd-b5c9-5916d4170b7a", + "uuid": "5fb0c103-042a-45e9-9ddf-cc97dc736175", "control-id": "cis_fedora_6-2.5.2", "description": "No notes for control-id 6.2.5.2.", "props": [ @@ -30426,7 +30518,7 @@ ] }, { - "uuid": "f25e0b52-36b1-4e08-8a06-4995535461b4", + "uuid": "96a20fbd-0dc4-48ea-bbbd-886c20eaa596", "control-id": "cis_fedora_6-2.5.3", "description": "No notes for control-id 6.2.5.3.", "props": [ @@ -30438,7 +30530,7 @@ ] }, { - "uuid": "83a46b52-f0bc-4053-ba52-3160188a4b27", + "uuid": "c3095746-1a3d-4b64-8484-f23c4756d617", "control-id": "cis_fedora_6-2.5.4", "description": "No notes for control-id 6.2.5.4.", "props": [ @@ -30450,7 +30542,7 @@ ] }, { - "uuid": "649d60bb-24bb-473b-8822-1c512e811c95", + "uuid": "0aa6e8ed-1f45-4d65-95b8-3498955ef95e", "control-id": "cis_fedora_6-2.5.5", "description": "The description for control-id cis_fedora_6-2.5.5.", "props": [ @@ -30463,7 +30555,7 @@ ] }, { - "uuid": "e8a19895-1049-41d8-be81-4d2918648047", + "uuid": "b1a8f577-45a8-48fe-ba97-82e11bf7d0d8", "control-id": "cis_fedora_6-2.5.6", "description": "The description for control-id cis_fedora_6-2.5.6.", "props": [ @@ -30476,7 +30568,7 @@ ] }, { - "uuid": "74a00d5e-319b-4c00-9524-8328e94fecdb", + "uuid": "02bebedb-b8b8-4d39-84f5-c661f44d8243", "control-id": "cis_fedora_6-2.5.7", "description": "No notes for control-id 6.2.5.7.", "props": [ @@ -30488,7 +30580,7 @@ ] }, { - "uuid": "2f1130a4-23ad-4d26-b85b-3a90761124ed", + "uuid": "a649fd30-4c3d-460b-bfea-1c990587c72e", "control-id": "cis_fedora_6-2.3.8", "description": "The description for control-id cis_fedora_6-2.3.8.", "props": [ @@ -30501,7 +30593,7 @@ ] }, { - "uuid": "1ecfbc82-133a-437a-b719-9f9098e014aa", + "uuid": "0902257d-c265-4510-ae06-8842351e9bbb", "control-id": "cis_fedora_6-2.6.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30528,7 +30620,7 @@ ] }, { - "uuid": "cc68f976-3501-40bf-9dd9-f7458ea5f24b", + "uuid": "b3299be2-7b4d-4715-b930-7c6daed2a46a", "control-id": "cis_fedora_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30555,7 +30647,7 @@ ] }, { - "uuid": "43b4149c-369a-4cdd-8da9-7f8b656602b6", + "uuid": "883eff83-f46e-4554-bc7d-1aac47d8e588", "control-id": "cis_fedora_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30582,7 +30674,7 @@ ] }, { - "uuid": "79b0df9c-fe31-4786-a063-97956b8d10e8", + "uuid": "6df7ab43-1097-4f09-9a36-fc9208146863", "control-id": "cis_fedora_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30609,7 +30701,7 @@ ] }, { - "uuid": "fc22be3f-02ee-4bd7-976b-13fee0bcb446", + "uuid": "1cc2f61d-7fc8-40db-87ca-5a59d59502ec", "control-id": "cis_fedora_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30636,7 +30728,7 @@ ] }, { - "uuid": "5d473a2f-8e54-4f37-901d-3307dbb7d178", + "uuid": "334d4bc7-0c7c-4ca0-b86b-c6335e70d5cb", "control-id": "cis_fedora_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30663,7 +30755,7 @@ ] }, { - "uuid": "3b14c574-6391-4401-96a4-43cab0726208", + "uuid": "eb209eb2-012e-44d6-9c7a-c9234c9e5416", "control-id": "cis_fedora_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30690,7 +30782,7 @@ ] }, { - "uuid": "d40f2e1e-704c-414a-9537-1797e942a4c3", + "uuid": "068c649d-336c-4c97-a274-d1247ca7eb41", "control-id": "cis_fedora_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30717,7 +30809,7 @@ ] }, { - "uuid": "df9031d6-6cef-478a-aec0-e62522c72e03", + "uuid": "f6c2183d-a04a-42ff-b282-e1d87a564752", "control-id": "cis_fedora_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30744,7 +30836,7 @@ ] }, { - "uuid": "608f9309-d34a-4ecd-8e46-8eb50676946e", + "uuid": "8e04e41c-453f-4448-8562-5635bc122b21", "control-id": "cis_fedora_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -30771,7 +30863,7 @@ ] }, { - "uuid": "02b7bd86-ef33-468a-8f25-47e0b2a516d2", + "uuid": "28bc8b4b-1ca4-43dd-b8cd-981a51bf18ad", "control-id": "cis_fedora_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -30813,7 +30905,7 @@ ] }, { - "uuid": "8090b9b5-515a-4681-812c-16d32ffa2806", + "uuid": "42510296-309d-4321-a2f8-f4a9094088ef", "control-id": "cis_fedora_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -30835,7 +30927,7 @@ ] }, { - "uuid": "9f0ffc2d-e18f-4ea8-affe-38003c6b5b3a", + "uuid": "581537ca-e5eb-46e9-9613-bc2708e8853b", "control-id": "cis_fedora_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -30857,7 +30949,7 @@ ] }, { - "uuid": "1911ebf5-ea45-4cb0-bca9-a023cb61b038", + "uuid": "9d55ba19-5aa2-4d37-9666-9c655b0e1b4f", "control-id": "cis_fedora_7-1.13", "description": "The description for control-id cis_fedora_7-1.13.", "props": [ @@ -30870,7 +30962,7 @@ ] }, { - "uuid": "c43fc80e-32cd-459b-9433-a2a279301d75", + "uuid": "41019039-f884-4ef8-bd98-b1ee1be4bb4d", "control-id": "cis_fedora_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -30887,7 +30979,7 @@ ] }, { - "uuid": "ab247323-62ad-45c3-9b8c-ea89ef869624", + "uuid": "e4ef4152-e630-479d-8a62-b0de9322c33c", "control-id": "cis_fedora_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -30904,7 +30996,7 @@ ] }, { - "uuid": "16183252-3898-4a5b-bf84-5d15413b7bdb", + "uuid": "451e694b-2e80-4189-8ca9-d08f1d378f8c", "control-id": "cis_fedora_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -30921,7 +31013,7 @@ ] }, { - "uuid": "296804e8-ec9b-495f-9047-12350f0ef280", + "uuid": "95154d00-98bf-4435-be4e-091a770ad873", "control-id": "cis_fedora_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -30938,7 +31030,7 @@ ] }, { - "uuid": "6ee39707-08cd-4c79-b1fc-df8565efa15f", + "uuid": "3f949a41-ec94-439d-a7f0-e732ad4a0575", "control-id": "cis_fedora_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -30955,7 +31047,7 @@ ] }, { - "uuid": "bf58a77c-a033-4e88-8051-ef3c07107a2d", + "uuid": "24ae2c55-856a-4cfc-88ae-dcf47258bb9d", "control-id": "cis_fedora_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -30972,7 +31064,7 @@ ] }, { - "uuid": "2df057a7-1f90-4885-b976-29c566ade6af", + "uuid": "9b1423d2-764e-4d9d-b4f8-192af905199e", "control-id": "cis_fedora_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -30989,7 +31081,7 @@ ] }, { - "uuid": "c34691fe-6b89-49fc-975c-d4523cbd44ad", + "uuid": "eafda197-5361-4022-8dad-90f076bef8cd", "control-id": "cis_fedora_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31016,7 +31108,7 @@ ] }, { - "uuid": "ba9fc66a-92b3-4b89-a469-4811491c7048", + "uuid": "8d7bbd92-4691-4a11-973c-46fe99a97ae2", "control-id": "cis_fedora_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json b/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json index 35e52c695..1426ea86e 100644 --- a/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json +++ b/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json @@ -3,8 +3,8 @@ "uuid": "2d7b24b2-1bb9-4f44-b6d1-9c6b27c84fe0", "metadata": { "title": "Component definition for fedora", - "last-modified": "2026-01-05T17:39:33.208342+00:00", - "version": "1.6", + "last-modified": "2026-03-27T01:45:31.826347+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -473,7 +473,7 @@ { "name": "Parameter_Value_Alternatives_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -491,7 +491,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -563,7 +563,7 @@ { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -2699,7 +2699,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_163" }, { @@ -6387,7 +6387,7 @@ { "name": "Parameter_Value_Alternatives_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -6405,7 +6405,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -6477,7 +6477,7 @@ { "name": "Parameter_Value_Alternatives_29", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -10557,7 +10557,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_163" }, { @@ -10569,7 +10569,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_163" }, { diff --git a/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json b/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json index 9e06817be..6ee9295e0 100644 --- a/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json @@ -3,8 +3,8 @@ "uuid": "e2f03e22-a04d-43b6-b9bd-963705759d02", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2026-01-05T17:30:19.476378+00:00", - "version": "1.5", + "last-modified": "2026-03-27T01:33:02.975894+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7380,7 +7380,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7398,7 +7398,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel10/rhel10-anssi-high/component-definition.json b/component-definitions/rhel10/rhel10-anssi-high/component-definition.json index 5153c086a..b8f48d902 100644 --- a/component-definitions/rhel10/rhel10-anssi-high/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "4a0dc350-a979-44df-a37c-3c868514176f", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2026-01-05T17:31:11.615612+00:00", - "version": "1.5", + "last-modified": "2026-03-27T01:33:58.626729+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8980,7 +8980,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8998,7 +8998,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json b/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json index 708c582b9..8b3e43979 100644 --- a/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json @@ -3,8 +3,8 @@ "uuid": "1f77331e-b554-42c3-a018-031a615e42c7", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2026-01-05T17:31:55.581077+00:00", - "version": "1.5", + "last-modified": "2026-03-27T01:34:45.890460+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -5558,7 +5558,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -5576,7 +5576,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json b/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json index 9d343a070..a7b111041 100644 --- a/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json @@ -3,8 +3,8 @@ "uuid": "186b75e3-6306-4419-b0a0-4f92c86067ab", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2026-01-05T17:32:30.212383+00:00", - "version": "1.5", + "last-modified": "2026-03-27T01:35:22.111992+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -185,7 +185,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -1407,7 +1407,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -1425,7 +1425,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { diff --git a/component-definitions/rhel10/rhel10-hipaa-addressable/component-definition.json b/component-definitions/rhel10/rhel10-hipaa-addressable/component-definition.json index 34a2ba3de..33988ffd9 100644 --- a/component-definitions/rhel10/rhel10-hipaa-addressable/component-definition.json +++ b/component-definitions/rhel10/rhel10-hipaa-addressable/component-definition.json @@ -3,8 +3,8 @@ "uuid": "6fa01944-e2c0-4b2f-a912-b51597c963c6", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-09-28T09:01:33.468511+08:00", - "version": "1.1", + "last-modified": "2026-03-27T01:36:53.114442+00:00", + "version": "1.2", "oscal-version": "1.1.3" }, "components": [ @@ -1655,55 +1655,55 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -1715,217 +1715,217 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { @@ -2063,7 +2063,7 @@ ], "control-implementations": [ { - "uuid": "65745034-30a1-466b-9fc3-db474f4fa32c", + "uuid": "46c411c0-2306-4b9d-a75a-5cf8a47c43c8", "source": "trestle://profiles/rhel10-hipaa-addressable/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -2107,7 +2107,7 @@ ], "implemented-requirements": [ { - "uuid": "d3fe4e8a-1f92-4625-abc6-0635d9c68014", + "uuid": "7baa1c4e-09e1-4f8f-aeb9-04f35df9603a", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -2129,7 +2129,7 @@ ] }, { - "uuid": "ff54630b-d21f-4630-bec2-85c0839c2b84", + "uuid": "583f499a-e1fc-4307-9b88-696f5b94744d", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -2146,7 +2146,7 @@ ] }, { - "uuid": "4e259aa4-782f-4cef-b7ce-571005af7728", + "uuid": "c3f7d79b-3ced-479e-be43-d3d05f4c0f0c", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -2248,7 +2248,7 @@ ] }, { - "uuid": "3411b3a0-4c09-484c-89bf-b6575c9872df", + "uuid": "e5d9cfe6-7606-4772-aaf8-84e7540abda9", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -2350,7 +2350,7 @@ ] }, { - "uuid": "5df2571f-82b8-4b3f-ac0d-c6b90fba9797", + "uuid": "10e5088e-121a-456f-b4b5-93f7045391e7", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -2452,7 +2452,7 @@ ] }, { - "uuid": "47ce3f96-f9cd-4e65-9a91-c7439bde7a52", + "uuid": "0babe367-d7d4-4b6f-bdf2-d7ce1d491a85", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -2714,7 +2714,7 @@ ] }, { - "uuid": "36317f54-b04c-422f-8796-5a2ded32d48e", + "uuid": "12ec0b2a-191f-473a-bb31-d5b40ac0b74a", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -2841,7 +2841,7 @@ ] }, { - "uuid": "339de897-0b27-4aed-87c8-a2d438c5ff77", + "uuid": "ba4b28df-92e0-4fae-8ddc-e092aa9a02eb", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -2858,7 +2858,7 @@ ] }, { - "uuid": "6ef4bc04-ae71-4a32-90ee-90ef297b9e31", + "uuid": "f8313ee9-bb6e-448e-b0e2-9d6335ee47fa", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -2885,7 +2885,7 @@ ] }, { - "uuid": "dc2b289e-60c7-4daa-a79b-46668aa5a66c", + "uuid": "1147da21-93a0-4b85-887b-4c85934b7f79", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -2932,7 +2932,7 @@ ] }, { - "uuid": "cb47fea0-c4f1-4540-94e8-85ead7238e8a", + "uuid": "8b9822b8-6f0b-40a2-91e2-17f52f979f61", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -2979,7 +2979,7 @@ ] }, { - "uuid": "a24742dd-32df-4a58-b2a5-1c79d0af8585", + "uuid": "3f66655a-cbbc-4c43-857a-899d98b7b1c7", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -3092,16 +3092,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "b3f990a7-1796-40d4-8799-2e7e06a0ab2c", + "uuid": "71182bbc-4c7b-47f7-b8c4-c89394def3e2", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -3173,7 +3168,7 @@ ] }, { - "uuid": "4c94f783-1428-4b65-beeb-dcf0b11f3832", + "uuid": "2d2b2e48-fa47-4472-a8fa-0f315740b7d5", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -3245,7 +3240,7 @@ ] }, { - "uuid": "775c03a1-06fc-4648-8e9a-57d370c81596", + "uuid": "c36e1b30-237e-4563-9992-86a918d5a9b8", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -3353,16 +3348,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "73b51c2b-10a8-4dbb-adb4-5d7f95a93b9c", + "uuid": "7f31fa45-ee22-436c-bc7a-e61641199c99", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -3379,7 +3369,7 @@ ] }, { - "uuid": "85b30306-0e6d-48b1-9a1a-12feec1893ec", + "uuid": "18ff3935-74e5-487e-ad96-458d26d20695", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -3841,7 +3831,7 @@ ] }, { - "uuid": "ea9d992d-8fa8-4a99-9e67-feb032d31b28", + "uuid": "2c3aa80f-dd70-4774-b00c-1b98c334e2c4", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -3943,7 +3933,7 @@ ] }, { - "uuid": "752f46a0-5b94-4a0f-b887-7b77966603c1", + "uuid": "056a96ae-487d-4a2d-b756-35f14b321327", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -3960,7 +3950,7 @@ ] }, { - "uuid": "6b8a00f3-8d4e-488a-96bf-0e2442a6ee3e", + "uuid": "e7c3e962-e038-42a6-a006-66c1d4b3064e", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -4073,16 +4063,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "c19856be-6386-4be5-b035-df3d2bd0a128", + "uuid": "9ae1ee0f-9254-4f7b-90b9-fa3aba540d47", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -4094,7 +4079,7 @@ ] }, { - "uuid": "5f53c182-31d8-42bc-9238-cdd22dad5770", + "uuid": "fe7af1fd-b69d-422c-9d89-c9f6059f0011", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -4196,7 +4181,7 @@ ] }, { - "uuid": "bf8b979e-036f-490f-88dd-d7714b6d17d0", + "uuid": "738b8a0b-335d-441b-b1dc-aa7686be7f7e", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -4228,7 +4213,7 @@ ] }, { - "uuid": "e3d2a8a4-1a55-48b7-bee6-252a9eb212ef", + "uuid": "10615e47-5170-45ec-906b-38f668816c56", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -4390,7 +4375,7 @@ ] }, { - "uuid": "d0c9916c-ff3d-48c7-b9d1-66eccf9e37fc", + "uuid": "5188afde-6d95-4655-a7f3-b01f50199b48", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -4407,7 +4392,7 @@ ] }, { - "uuid": "c4120d84-08e4-42f1-b4aa-4552c0e30556", + "uuid": "35eb783f-3b66-48ca-bbbd-56bd82e3fec8", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -4519,7 +4504,7 @@ ] }, { - "uuid": "8becf6f2-4792-493c-819f-9ebc97cfe7a2", + "uuid": "527b2077-482a-40da-8bd8-8a1f22387c21", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -4541,7 +4526,7 @@ ] }, { - "uuid": "55a8a9a7-fd63-44ac-9377-96ba29faf7a3", + "uuid": "40a96edf-1fb4-4a62-9ae2-2a1cc1983b8f", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -4618,7 +4603,7 @@ ] }, { - "uuid": "74bc1a63-08c9-4a61-b019-87f1c5e12cb4", + "uuid": "aae054fa-b261-4f50-b2aa-7d1a219cbb2a", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -4645,7 +4630,7 @@ ] }, { - "uuid": "a7a6e82f-5e32-48f7-b8f3-052f9cd58726", + "uuid": "8a2c1a57-6d97-4878-975a-a2feb94e53a1", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -5157,7 +5142,7 @@ ] }, { - "uuid": "44b59504-e958-47d6-a953-11f5fa1e60f2", + "uuid": "c48d335c-413d-47b7-b402-5a934799fafd", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -5174,7 +5159,7 @@ ] }, { - "uuid": "b160d3bc-d6f8-467a-82fc-945eefc475fb", + "uuid": "3038952a-a87b-4885-b545-ddede97b42ab", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -5221,7 +5206,7 @@ ] }, { - "uuid": "4d8223ff-15ab-4646-a18d-629bd56c283b", + "uuid": "021c4527-8fcc-473c-a0ab-27d0dd29b549", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -5668,7 +5653,7 @@ ] }, { - "uuid": "be4c8dc3-c259-421d-bade-00c18a691944", + "uuid": "ab3c43be-7646-4ab0-bd59-9d9de17bb077", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -6170,7 +6155,7 @@ ] }, { - "uuid": "6505f749-0666-467e-b5a9-d4a50709aa66", + "uuid": "ac46ff75-c025-4f4e-892d-42d1efe60d96", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -6283,16 +6268,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "c67aabab-63fb-4be3-a65e-fde38d6bcd81", + "uuid": "9a9ec94d-bbda-41a7-83ee-5ded07eb7236", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -6314,7 +6294,7 @@ ] }, { - "uuid": "ac39e8ca-53e9-4a76-8d10-e4038c169041", + "uuid": "97ae4326-8cec-4ec0-8e7f-a63ec851bffa", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -6331,7 +6311,7 @@ ] }, { - "uuid": "252167cb-cd0f-4c2c-9c0c-f733315810e0", + "uuid": "4408612d-53a3-46ba-a1d9-de01300b329c", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -6433,7 +6413,7 @@ ] }, { - "uuid": "059155cc-53b5-4e2d-8126-daf694fe53ca", + "uuid": "a310743d-0289-47d7-87c0-5ce5ba2dbf20", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -6535,7 +6515,7 @@ ] }, { - "uuid": "82b7d5d0-6458-4f64-a9c2-f212dadfc773", + "uuid": "3c38f0b7-740d-497a-ad37-d6ab81ec849c", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -6637,7 +6617,7 @@ ] }, { - "uuid": "b82d7ba5-b6bc-447a-8e27-27dfe2ead880", + "uuid": "9e6cef47-4bf8-4dd8-bbff-90e52e70ebc7", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -6899,7 +6879,7 @@ ] }, { - "uuid": "dbe507fe-a755-4d09-9f03-90865baf4994", + "uuid": "7f01663d-3915-4825-a571-010db3824a46", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -7026,7 +7006,7 @@ ] }, { - "uuid": "59a27a6c-cf8e-40e7-859c-f099efe731fd", + "uuid": "95bac848-7277-4c2c-9839-a44c39fc0c4d", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -7043,7 +7023,7 @@ ] }, { - "uuid": "d0f13c51-e874-405f-888c-9c72fbbdce3c", + "uuid": "3c694b18-33c0-425a-8d9e-150ec85acf99", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -7070,7 +7050,7 @@ ] }, { - "uuid": "ea0667d0-651d-44ee-81de-68ba8a5389ce", + "uuid": "fc014b36-5fcb-48ca-bb8c-7970935e50d7", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -7117,7 +7097,7 @@ ] }, { - "uuid": "82acf0db-60e3-4eb9-9775-99dc4488bae6", + "uuid": "ca3da4ed-9572-41d9-ba0b-1201d057a26f", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -7164,7 +7144,7 @@ ] }, { - "uuid": "e654a573-7f75-4ac9-90e1-e23379f03017", + "uuid": "883e26b1-5b0c-413c-8094-bd7fc2721a53", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -7277,16 +7257,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "e21f9caf-9c99-4659-831c-e9db37a1bc54", + "uuid": "03c146e2-49aa-4fc0-aa39-931587ff8f24", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -7358,7 +7333,7 @@ ] }, { - "uuid": "2215d1f9-6adc-4d49-b274-45b89631a8f7", + "uuid": "f1dc9b54-bd2c-4b30-8c7c-3acc3adaf0ff", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -7430,7 +7405,7 @@ ] }, { - "uuid": "fdd42626-a305-4b0e-9de3-89a1ff44d56c", + "uuid": "d8de0927-4efd-44b2-89fa-cb8617b402c5", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -7538,16 +7513,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "dabe4826-75b0-4437-801e-dda0f51d41e4", + "uuid": "e2176028-22be-4863-a2f2-42d13b0ee379", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -7564,7 +7534,7 @@ ] }, { - "uuid": "3b531a63-28ca-4ffe-960d-e7e496457893", + "uuid": "b36fbb6e-94aa-49a8-8578-c584c26b0486", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -8026,7 +7996,7 @@ ] }, { - "uuid": "e906598b-4a25-4dd3-af14-53d7363ff25d", + "uuid": "5742a149-b4d2-4d69-8b9f-fff0c1c467ec", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -8128,7 +8098,7 @@ ] }, { - "uuid": "d5cbb476-507f-487f-a001-377ffc93fde9", + "uuid": "c66c4adf-ef09-464b-ac32-b581d6601019", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -8145,7 +8115,7 @@ ] }, { - "uuid": "43f3e777-506a-45e5-8dfb-c58c6779f6e6", + "uuid": "cfa7cc12-9b2a-4269-9a2c-26e93af474b8", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -8258,16 +8228,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0a4460b3-3b35-4080-a28e-841798a7873f", + "uuid": "d2047f98-52cb-417c-b8a6-7e07133259c0", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -8279,7 +8244,7 @@ ] }, { - "uuid": "9b039e5e-f858-456b-a987-ef9ba4f26d9f", + "uuid": "59d7b73a-3bc4-4c9a-bb3b-c22dc50c56d4", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -8381,7 +8346,7 @@ ] }, { - "uuid": "08129797-5782-4b83-b34c-833e1dd8f65b", + "uuid": "9acd64f8-0a83-45a4-932d-12e7b3c949e4", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -8413,7 +8378,7 @@ ] }, { - "uuid": "3f082e5e-74eb-4931-9d92-01addd1317cb", + "uuid": "93d949fb-faeb-46f5-95f6-bc385d6915c8", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -8575,7 +8540,7 @@ ] }, { - "uuid": "a3e902fc-8643-401b-a073-a40a12baba17", + "uuid": "d3df1d0f-3002-4649-8c44-a0cde5199a06", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -8592,7 +8557,7 @@ ] }, { - "uuid": "bbaef3df-a8d2-473e-934c-dab5488b3407", + "uuid": "74533f30-ea99-4297-8719-c6fe8960d491", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -8704,7 +8669,7 @@ ] }, { - "uuid": "208c30f8-134d-4446-9167-37f42ab91fc7", + "uuid": "e30e8d94-c71f-4108-8e75-88bee3c59a22", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -8726,7 +8691,7 @@ ] }, { - "uuid": "34997e5a-55b7-4e2c-b0a7-618c7cb7d898", + "uuid": "f48a4735-7c48-42ae-b230-a70ba5dadf6f", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -8803,7 +8768,7 @@ ] }, { - "uuid": "620687c9-e1de-49ab-ac43-84ba7e529d59", + "uuid": "20f87a14-d83c-4f3c-ae7f-9b0c7b89d28a", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -8830,7 +8795,7 @@ ] }, { - "uuid": "7966a85a-615e-4c9b-bfb0-f9d4b79816e5", + "uuid": "cedd483a-8a40-41ad-9107-3c92b1f7524e", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -9342,7 +9307,7 @@ ] }, { - "uuid": "6f30ffe8-e2ea-47c2-bb3e-d609bfee5c2b", + "uuid": "cc3e0dfc-5513-4a18-84dc-56051bf47d03", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -9359,7 +9324,7 @@ ] }, { - "uuid": "af7843d6-b046-4867-bd5b-dce184320b14", + "uuid": "95f471c3-8132-4766-bcaa-a65c380319c3", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -9406,7 +9371,7 @@ ] }, { - "uuid": "20dd8182-832c-406b-8070-c71b2ccb5e32", + "uuid": "5877f13a-6bf7-4a82-979e-1d3a1b2262a4", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -9853,7 +9818,7 @@ ] }, { - "uuid": "f9aa5cb2-a8fa-4ba1-a35c-21c7a0cfda7b", + "uuid": "341adb4e-adb8-4fa1-86e5-a8751530a278", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -10355,7 +10320,7 @@ ] }, { - "uuid": "f0af6e47-a71c-48ec-b79d-b369d9d4b7ae", + "uuid": "0362c35e-de48-4b61-84f6-e809b81461e3", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -10468,16 +10433,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "05e97bb9-2b6d-4c9a-90a6-9ac3e9b6fad7", + "uuid": "76fdd9c1-6faa-4603-b43b-b381de314ee2", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -10549,7 +10509,7 @@ ] }, { - "uuid": "5366ba83-9842-48b4-8157-83569c3b9500", + "uuid": "b90695d0-4379-4ee4-bff1-538abecc9181", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -10621,7 +10581,7 @@ ] }, { - "uuid": "998876c9-6753-4943-ac53-e107168e43d9", + "uuid": "5dd05a90-4083-47bb-b5ce-ed1da62acf37", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -10729,16 +10689,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "b7059ccc-c5a7-4a60-9c69-2c6380db5f9f", + "uuid": "229bd993-6d53-4e11-847f-f8ad88604676", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -10755,7 +10710,7 @@ ] }, { - "uuid": "a9ebc82d-20c3-4436-bcfd-be91ad32226a", + "uuid": "2caa002e-43a0-448e-ac94-d2d45e006c3a", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -11217,7 +11172,7 @@ ] }, { - "uuid": "2a33b5da-b1b6-4ed0-9974-4c3cfdce5a08", + "uuid": "f1ee6c16-38d4-4a44-a274-fdd95c9ec10a", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -11319,7 +11274,7 @@ ] }, { - "uuid": "fd0331bd-38a2-4e62-a30f-d04187234a28", + "uuid": "a45d1374-fe77-4587-8569-9ebfd462d7a6", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -11336,7 +11291,7 @@ ] }, { - "uuid": "66507a79-e336-4067-9330-2678141057cd", + "uuid": "79e11d9d-6019-4d50-8380-764cd918543f", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -11449,16 +11404,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "2896aa38-946b-4d19-8d73-644994f1691b", + "uuid": "cd6ea1ae-ff32-4601-bb91-c8eaaee54d96", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -11470,7 +11420,7 @@ ] }, { - "uuid": "8918ec9f-e667-4b37-84d3-bb0c78b40a58", + "uuid": "08b9d188-5a29-4864-99a5-5ffe45261854", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -11572,7 +11522,7 @@ ] }, { - "uuid": "795df195-c836-47ba-b4c9-60ae0ceaf145", + "uuid": "d5b27160-dcff-4ff4-b26f-c2e427d57f4d", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -11604,7 +11554,7 @@ ] }, { - "uuid": "0867c6c9-ca31-4f44-ae3b-c42145094653", + "uuid": "d1d7c3f6-425f-4b51-872c-ced06c06b1f2", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -11766,7 +11716,7 @@ ] }, { - "uuid": "262e7389-e6c2-4e7c-80ff-90da6bea2487", + "uuid": "8ed4b870-88c0-49da-8f39-a7edcfc7b1ef", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -11783,7 +11733,7 @@ ] }, { - "uuid": "5db7a450-df82-4d4b-a830-b9ef252fb7e9", + "uuid": "ddca7f08-19c2-449f-96b9-be7056d2c0dd", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -11895,7 +11845,7 @@ ] }, { - "uuid": "1d4d9905-2563-434a-9193-8045c33e1358", + "uuid": "9287166a-3332-4adc-83c0-05fa07634fc8", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -11917,7 +11867,7 @@ ] }, { - "uuid": "2360aff9-7d66-4c6a-ae9e-957038ba6edd", + "uuid": "9aa80e1b-3ad7-4219-a5ac-c978b17065f2", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -11994,7 +11944,7 @@ ] }, { - "uuid": "8630d998-da2d-479c-960d-ab4052747499", + "uuid": "08e56d01-e60a-4f39-b6cc-456cf824c73f", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -12021,7 +11971,7 @@ ] }, { - "uuid": "2973c9ae-4024-4654-8fc5-efc806673f0d", + "uuid": "3a0bc8fc-ed93-4f69-93ea-37e6c9282fd1", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -12533,7 +12483,7 @@ ] }, { - "uuid": "1d0047a6-aa0a-4335-9942-64bdfee8a60f", + "uuid": "a4c8135b-3212-440f-951f-f6130054c50a", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -12550,7 +12500,7 @@ ] }, { - "uuid": "52e7a0af-76dd-464a-ac70-bce9ba0d5d5e", + "uuid": "d3f54ce5-7984-4dd0-9769-d3ba8d10c880", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -12597,7 +12547,7 @@ ] }, { - "uuid": "2eb171be-81a0-4189-b7c3-3f1c021d1c23", + "uuid": "c8c90824-0b3b-4a99-b31c-f11b6d1d8fb2", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -13044,7 +12994,7 @@ ] }, { - "uuid": "5948d90e-6a2f-4f4b-af4c-5f340c4e0220", + "uuid": "eb896d9c-0191-4d0b-b2af-77f4c610ec16", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -13546,7 +13496,7 @@ ] }, { - "uuid": "8c56ca7d-5769-4a9c-b495-740c50090392", + "uuid": "22583da8-1738-4c9e-83b0-64860751d0d4", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -13659,11 +13609,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } @@ -16866,103 +16811,103 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -16974,7 +16919,7 @@ { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -16986,433 +16931,433 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { @@ -17682,7 +17627,7 @@ ], "control-implementations": [ { - "uuid": "52cc847c-4b91-4525-97c4-d9e6e7ac2c88", + "uuid": "2e39e584-66e7-47c0-a058-a55155f9c292", "source": "trestle://profiles/rhel10-hipaa-addressable/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -17726,7 +17671,7 @@ ], "implemented-requirements": [ { - "uuid": "27522e6c-f201-465f-879e-bcf064a2f86d", + "uuid": "7d3e1327-6d6f-4083-8c4c-466eb17dea78", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -17748,7 +17693,7 @@ ] }, { - "uuid": "a05c9c77-918d-4538-a345-5ebae67629a7", + "uuid": "4e133fa9-4291-48ac-a107-a9a378101284", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -17765,7 +17710,7 @@ ] }, { - "uuid": "897ca575-22e3-4cbc-bfb0-f807085b12df", + "uuid": "655c0b56-dcda-40ac-9cef-34fdd4421726", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -17867,7 +17812,7 @@ ] }, { - "uuid": "6ca38712-e476-4da4-8984-4dab277f2673", + "uuid": "20731d29-00d6-495a-936d-9023ea832c0a", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -17969,7 +17914,7 @@ ] }, { - "uuid": "5429a50e-c89d-442e-a7f8-1bb7e8dc1515", + "uuid": "3447f8ef-28a9-4acc-beaf-6748d26647d5", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -18071,7 +18016,7 @@ ] }, { - "uuid": "f2e51b2e-a1a8-4ea2-8d45-2dcdab64f869", + "uuid": "60ac1db1-c174-4831-ae5d-668e2d5c9300", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -18333,7 +18278,7 @@ ] }, { - "uuid": "300770a2-0d65-4465-b139-e61c213fef05", + "uuid": "1bdcc528-369e-4c59-8dc5-6cd5f031851f", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -18460,7 +18405,7 @@ ] }, { - "uuid": "acdbef33-a7ec-40c0-bcb6-47cf80cb6e5e", + "uuid": "a1b39357-1cf3-4e3f-aca3-3930058ae8bc", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -18477,7 +18422,7 @@ ] }, { - "uuid": "ba0225dc-c2f8-44a5-a674-b3af1b65b1da", + "uuid": "a48ed3e2-5e2e-4473-bb43-9c202e980fcb", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -18504,7 +18449,7 @@ ] }, { - "uuid": "0092f130-ee99-407c-a375-1f635a2ceef4", + "uuid": "8439e6c8-8ebe-4890-81d5-bc2653d8a4b5", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -18551,7 +18496,7 @@ ] }, { - "uuid": "3b15bd23-7906-476b-a5e8-fa5db693de63", + "uuid": "eaa9873a-24c2-43fe-95e1-a6af1f61ee25", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -18598,7 +18543,7 @@ ] }, { - "uuid": "361187d5-f4ad-49ef-bdfd-cf02a5f53ce3", + "uuid": "b3a8e9fe-cc4f-4662-887e-904bb37008f0", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -18711,16 +18656,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "8aafb04a-4179-431e-abbc-b518a057bec5", + "uuid": "daf6fd65-a818-4328-8204-0781e3946c17", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -18792,7 +18732,7 @@ ] }, { - "uuid": "90ed7bf7-e9eb-4320-b8b1-1004d4e4175e", + "uuid": "21d8235e-4cc5-4248-bf29-7146f60a3b60", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -18864,7 +18804,7 @@ ] }, { - "uuid": "2a65fe7f-bcfc-4181-8013-e676ee94065c", + "uuid": "5a5d4b17-7185-41bb-92c7-639f2b7c9cff", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -18972,16 +18912,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "6ac7550c-f963-4c1d-b382-4b83798c4129", + "uuid": "c3497f16-dc0a-4503-ba9c-26bb092eceb5", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -18998,7 +18933,7 @@ ] }, { - "uuid": "f5c3c5ac-4d31-45c0-93b4-eb2f2eca865f", + "uuid": "2f0aea6b-4c3c-488e-b050-1e03bb315973", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -19460,7 +19395,7 @@ ] }, { - "uuid": "b03038fe-ca7d-44a8-a077-d685e003ebe7", + "uuid": "ee298b4f-e6c0-4520-8539-d214893fb2b9", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -19562,7 +19497,7 @@ ] }, { - "uuid": "f040e7c6-30fd-4741-9af5-9063bda8f0eb", + "uuid": "2a427afa-fed0-4a48-90f3-2c5acae59eab", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -19579,7 +19514,7 @@ ] }, { - "uuid": "cb1d7051-6b06-4b9b-8077-2e3c0af859bb", + "uuid": "b7337f0f-ed25-43f6-9d85-c3b526c9144d", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -19692,16 +19627,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "6a40c3fd-adac-483d-a9ca-09172abdd085", + "uuid": "d35eae88-c710-47ca-99cd-d757a7c84497", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -19713,7 +19643,7 @@ ] }, { - "uuid": "4f8644d8-cfd2-4e7b-893e-367d6fa189ea", + "uuid": "5e16e548-918f-411f-84ea-766d0c5a7f49", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -19815,7 +19745,7 @@ ] }, { - "uuid": "6f4987c8-8ded-4586-a1da-a34a078e8d06", + "uuid": "74b0654d-f78f-4d8d-9205-be81cb74431f", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -19847,7 +19777,7 @@ ] }, { - "uuid": "f2926e1e-1bec-4ab7-b942-cd7d307f418c", + "uuid": "35b84ca2-f8c8-4432-8496-c72a762bbf30", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -20009,7 +19939,7 @@ ] }, { - "uuid": "1ef700b6-537b-462f-bd1c-b6a98ad4734e", + "uuid": "1da7dec3-075c-4a8c-92b4-4448729c9d6a", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -20026,7 +19956,7 @@ ] }, { - "uuid": "39f61532-8fc1-4218-9ac5-6c25953b7c35", + "uuid": "9bb11bb8-9892-48e8-b47b-425cec04228e", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -20138,7 +20068,7 @@ ] }, { - "uuid": "590fb066-db18-4c7a-ba6f-e9eb3d3e9426", + "uuid": "698814f9-3d88-4fbb-85a7-43c3100ad7cb", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -20160,7 +20090,7 @@ ] }, { - "uuid": "904e0a09-a470-4af0-b396-1e26c1f2b245", + "uuid": "fc418d88-5bb1-41b3-97a3-fe30b632d7f9", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -20237,7 +20167,7 @@ ] }, { - "uuid": "a82120f5-9637-49ab-a04d-bebc67fd58f6", + "uuid": "5f73f428-a3d7-4931-b36b-319062fa2bbe", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -20264,7 +20194,7 @@ ] }, { - "uuid": "1609a813-aac8-4e86-96a3-09ae886e7532", + "uuid": "6a5574db-3593-4c5c-bab4-68d24e856bb0", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -20776,7 +20706,7 @@ ] }, { - "uuid": "6d76ab4a-2aff-4ead-81e9-45f0d30f49e9", + "uuid": "03bc04c9-ccbd-4472-b92f-27b52f5c59e3", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -20793,7 +20723,7 @@ ] }, { - "uuid": "ba33d549-2c50-4def-a032-368d1f8452a0", + "uuid": "4cb48b64-d7f9-4b0f-9a26-cd1d7dc83171", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -20840,7 +20770,7 @@ ] }, { - "uuid": "f41c1764-d058-4861-bdb8-78f5968b2bd2", + "uuid": "593f64d0-0362-4eca-834c-b5e3f259e1be", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -21287,7 +21217,7 @@ ] }, { - "uuid": "2d1e8a54-da32-456c-98af-4d18b6f1e455", + "uuid": "a0366416-de77-4eab-9c44-b6649aa46421", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -21789,7 +21719,7 @@ ] }, { - "uuid": "f5f0f498-311b-42d9-8cf3-90b2c7dc0e6a", + "uuid": "38bb1664-b79d-4ce5-a0a2-bf55f7569fc4", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -21902,16 +21832,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "9ead5033-b438-4066-969b-4b972a78a634", + "uuid": "05063d88-a9b1-48d6-9f5d-b672e1473d8e", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -21933,7 +21858,7 @@ ] }, { - "uuid": "7f8aff44-a367-459b-a2ca-f3c7ab452b02", + "uuid": "b2eb5278-e9f7-4a07-9d40-2467b3737eea", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -21950,7 +21875,7 @@ ] }, { - "uuid": "88e6bd37-3eb0-42e0-97a3-b2d1a3662aee", + "uuid": "bb5fb5f4-bcb7-4a70-9bbf-70b68a005c48", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -22052,7 +21977,7 @@ ] }, { - "uuid": "35ec04e1-5043-48f8-8faf-a36def69ae79", + "uuid": "145367ab-4a97-4034-96ed-e1ecb3406aa5", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -22154,7 +22079,7 @@ ] }, { - "uuid": "d2ab07e5-983d-443d-b644-9135c0447de2", + "uuid": "114c9247-18c2-41d7-894c-c81b4dfe7009", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -22256,7 +22181,7 @@ ] }, { - "uuid": "dfa2809b-9a90-4c7c-b1ca-45394a30fb78", + "uuid": "e0c23a83-c063-433d-a84c-bfd30721498e", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -22518,7 +22443,7 @@ ] }, { - "uuid": "415a4695-1cb4-47d1-b6f0-feb20e4f8746", + "uuid": "9b5216b8-f1c2-40ab-a0b0-10b4d5fe3e28", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -22645,7 +22570,7 @@ ] }, { - "uuid": "4c9e359a-9164-410d-9515-9e6eba56ed08", + "uuid": "0fe26aa2-85c3-4832-b099-bf51fd086d3c", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -22662,7 +22587,7 @@ ] }, { - "uuid": "55d88462-8685-4b20-b898-4a049f0818bf", + "uuid": "8875a293-7a80-4cd9-a9cc-669b09ef5693", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -22689,7 +22614,7 @@ ] }, { - "uuid": "b4aa520e-9caf-4bdb-8f4a-167fae925818", + "uuid": "3b9be918-40be-451e-bb23-38bac9ae129e", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -22736,7 +22661,7 @@ ] }, { - "uuid": "b3aa4d45-aaac-489b-8e2a-572b5270e759", + "uuid": "f71c5e82-bdf4-47e8-9331-ad1dec80e53a", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -22783,7 +22708,7 @@ ] }, { - "uuid": "9d4da2df-417b-4167-b4c6-cacef444f812", + "uuid": "065ca366-becf-4e9c-b2b3-b23ee50713f7", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -22896,16 +22821,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "eca9432c-24b6-4b25-b793-7d2ed8d6f000", + "uuid": "a8447da0-8c18-4215-8fe2-4a3af444e223", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -22977,7 +22897,7 @@ ] }, { - "uuid": "02607899-75fa-4c41-bc76-b4a6ff28b0d2", + "uuid": "efbb9012-9231-4220-a948-e8ec29daedd0", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -23049,7 +22969,7 @@ ] }, { - "uuid": "51e05f2c-3a56-4b80-a04a-b0f0d371ccd2", + "uuid": "fbf962e5-1e02-4277-aef3-7fd9e79fd85a", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -23157,16 +23077,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "515eb4fb-4ad3-4013-b210-8ce4cb24baf1", + "uuid": "4a0f7bbd-1616-4c98-8a96-029ffd4c9ab9", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -23183,7 +23098,7 @@ ] }, { - "uuid": "d75aed51-69e5-485d-91b3-e1103076e8bc", + "uuid": "92d176e5-45e1-4807-9b30-f0bc8243013e", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -23645,7 +23560,7 @@ ] }, { - "uuid": "1d341da6-a983-4137-9aac-e5a60eb3bff5", + "uuid": "7e9982a7-720f-4945-a747-6ae16d179e39", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -23747,7 +23662,7 @@ ] }, { - "uuid": "9faa0eaf-0216-4f02-87ac-b9cdd7be5854", + "uuid": "36c38d33-ac36-4333-8572-ffd7fb0303e4", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -23764,7 +23679,7 @@ ] }, { - "uuid": "6ede054c-7b5c-4990-a02e-22b2031f27e0", + "uuid": "241da36d-1c41-4657-9c73-e1ded7ff1c0d", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -23877,16 +23792,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "79fe5d7e-cd38-4755-88e5-c3ecc39b7ad7", + "uuid": "54ff8dd3-2dd3-47f9-8caa-4219af81879c", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -23898,7 +23808,7 @@ ] }, { - "uuid": "b8c6fdb2-b1c4-4b73-a26a-34514cb9cafb", + "uuid": "d582fa2d-0523-4922-a2c5-3eade1c394ac", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -24000,7 +23910,7 @@ ] }, { - "uuid": "3945954e-4bc6-4090-a0c5-bfd7fc700b13", + "uuid": "d51d270f-b024-43c7-be59-728a5e0409ce", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -24032,7 +23942,7 @@ ] }, { - "uuid": "8dbc0780-1fa1-4441-bec3-f1a930c0dbe6", + "uuid": "72ccd958-df4c-4d14-90d1-ddf7ff16c549", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -24194,7 +24104,7 @@ ] }, { - "uuid": "4e45fbdd-87c6-4326-8fa9-44be9e3ad0d8", + "uuid": "ac92b732-66b5-4052-a157-ebff8ba8adcf", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -24211,7 +24121,7 @@ ] }, { - "uuid": "608bf729-415c-40e9-9498-c41908cc363d", + "uuid": "4cc2f61e-98e8-41ad-8b7b-1bf4991f576f", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -24323,7 +24233,7 @@ ] }, { - "uuid": "57e67505-c3c4-4743-b767-7cb1d22d60da", + "uuid": "3034ce51-c5ed-4373-8c46-f4e5235ab3b2", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -24345,7 +24255,7 @@ ] }, { - "uuid": "47570172-a889-4844-a0b9-2549aaf697a1", + "uuid": "55b9ee3b-d912-409d-8b5c-1657bcede599", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -24422,7 +24332,7 @@ ] }, { - "uuid": "1b9cd846-ec08-4824-b9cb-da9aa7bf25b7", + "uuid": "5a448642-af35-489c-a7e5-8b7364eba56c", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -24449,7 +24359,7 @@ ] }, { - "uuid": "b5ffe1be-9ec2-4892-81c6-2162204cfe9b", + "uuid": "76df054f-b368-4e49-b58d-efb2116e1bd5", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -24961,7 +24871,7 @@ ] }, { - "uuid": "616fa7b5-f9c3-4337-ac18-0f75cdc14f37", + "uuid": "58075434-c0ee-4a7a-b3f3-f44dcf57afa4", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -24978,7 +24888,7 @@ ] }, { - "uuid": "80ff519f-4bd6-4e98-861f-4c0f5132c3b4", + "uuid": "63719e33-0ed4-4252-be04-cdba594c9c73", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -25025,7 +24935,7 @@ ] }, { - "uuid": "58437425-541f-4ca2-9b58-ae53cd582e9a", + "uuid": "4e644911-12dc-4301-a33f-a4cea8967f45", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -25472,7 +25382,7 @@ ] }, { - "uuid": "958598d9-8a9d-4aa3-86c0-e29a05b8551e", + "uuid": "9c511749-c992-431b-86bd-77cee3bacc0f", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -25974,7 +25884,7 @@ ] }, { - "uuid": "2f27bfa3-b40e-42c9-9c37-8f5cb74efa73", + "uuid": "ff401d49-4365-4d54-8378-f0b2ca8577b2", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -26087,16 +25997,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0f365e0b-61d8-4203-851f-0151b1e54541", + "uuid": "9b163064-b085-4ebe-abb1-195a089087ea", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -26168,7 +26073,7 @@ ] }, { - "uuid": "504be239-8b27-43b4-8479-e24781e9806d", + "uuid": "fba8697d-7a22-49e0-af40-e2abbb5f12a6", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -26240,7 +26145,7 @@ ] }, { - "uuid": "886112cc-453c-4f32-8f95-cc1372269df2", + "uuid": "08ac4e1c-d600-4eb6-b17f-a3b9a6623629", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -26348,16 +26253,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "e5315e42-1b98-472d-bb97-842c0ec1be79", + "uuid": "339001c3-2bbf-4057-b521-30d1d22e3b83", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -26374,7 +26274,7 @@ ] }, { - "uuid": "a039fe8b-6ed7-4c36-97cb-47c2021c9258", + "uuid": "b4ef0900-b6e0-4201-a094-5ecffab80c05", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -26836,7 +26736,7 @@ ] }, { - "uuid": "b8addafd-ff18-4422-81b1-5b14203511e5", + "uuid": "7c6c32c1-9d27-4e89-9f1d-1213054fda75", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -26938,7 +26838,7 @@ ] }, { - "uuid": "587901cd-87ea-4593-9894-cbaccf1833ab", + "uuid": "e60f6036-fabd-479a-b585-19d8968ba252", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -26955,7 +26855,7 @@ ] }, { - "uuid": "2edfb968-c19b-43c9-833e-da14c8e68864", + "uuid": "baa26b1b-eb80-4628-b95e-ae932061556e", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -27068,16 +26968,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "06b18c02-6298-4ea1-875b-964d734b6f82", + "uuid": "e17cabec-022d-47b3-9d31-358b527170ee", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -27089,7 +26984,7 @@ ] }, { - "uuid": "cbb6756e-12b6-4f18-beb9-bbc090674eb0", + "uuid": "b1a42c9a-f740-4ac4-b24d-8e37e6a5e5e3", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -27191,7 +27086,7 @@ ] }, { - "uuid": "8c77d670-41b3-4417-8a6e-8b1e264dba35", + "uuid": "f0bc145c-d328-48a2-b26e-80b40c10efc8", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -27223,7 +27118,7 @@ ] }, { - "uuid": "8f819930-398a-47ae-ba7a-5c1870de2165", + "uuid": "a5acbde9-5200-4f43-be09-0f820c6eba72", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -27385,7 +27280,7 @@ ] }, { - "uuid": "d2b9f1d1-3470-4f76-b6c5-a871ba8502f3", + "uuid": "82af2c1c-fbb4-4d30-93bd-2e9f4086ffa5", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -27402,7 +27297,7 @@ ] }, { - "uuid": "6c083c40-5ea6-4c89-aa12-877fe5047288", + "uuid": "7b1f6276-9e1b-40bf-919e-6fc46642c762", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -27514,7 +27409,7 @@ ] }, { - "uuid": "1d0d8f71-c831-4a38-a992-607ee47ff189", + "uuid": "19b2b3c7-380e-414f-a6ce-d12e90cbd6e5", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -27536,7 +27431,7 @@ ] }, { - "uuid": "9abdafbc-bcc4-4593-940c-d11ce50819a0", + "uuid": "1f00e2c4-e689-4594-a70e-a2e3256b8b84", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -27613,7 +27508,7 @@ ] }, { - "uuid": "5a0ede88-76a6-4d43-9bff-507d502f7d8d", + "uuid": "a5f4f20a-eb68-44ca-8406-673ec2880ee5", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -27640,7 +27535,7 @@ ] }, { - "uuid": "3b6bea41-87ad-48c9-aa0e-2fdd4d582eb0", + "uuid": "ddd94c6c-124c-43e2-b107-4892c33568eb", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -28152,7 +28047,7 @@ ] }, { - "uuid": "d4d8801c-de9d-4be9-8a07-127cba7e1455", + "uuid": "85d678b8-04fc-478e-ad95-6ef7b63c8e9d", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -28169,7 +28064,7 @@ ] }, { - "uuid": "bc2a73d3-e030-4e3a-bfb1-33a9cc382959", + "uuid": "34f92359-6449-43a1-9c2c-93c66d6355f8", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -28216,7 +28111,7 @@ ] }, { - "uuid": "3c0594c4-0788-4a76-b1c3-72cb31bcfa53", + "uuid": "39c12bb4-706f-4885-b302-21db2c2cbcbb", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -28663,7 +28558,7 @@ ] }, { - "uuid": "68ad1fef-89ed-48f6-a433-817d78fba86c", + "uuid": "4d38de6e-cce3-4551-8d7b-fdfac64423a8", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -29165,7 +29060,7 @@ ] }, { - "uuid": "f5c3984a-161a-4207-bc5c-364e8d756841", + "uuid": "285235df-2dae-4e38-bf14-a09e736706f1", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -29278,11 +29173,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } diff --git a/component-definitions/rhel10/rhel10-hipaa-base/component-definition.json b/component-definitions/rhel10/rhel10-hipaa-base/component-definition.json index a2ac43761..9d5a23e59 100644 --- a/component-definitions/rhel10/rhel10-hipaa-base/component-definition.json +++ b/component-definitions/rhel10/rhel10-hipaa-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "aa901b6c-453f-49d6-9483-2686c28a9ee2", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-09-28T09:02:21.992980+08:00", - "version": "1.1", + "last-modified": "2026-03-27T01:37:38.288247+00:00", + "version": "1.2", "oscal-version": "1.1.3" }, "components": [ @@ -1655,55 +1655,55 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -1715,217 +1715,217 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { @@ -2063,7 +2063,7 @@ ], "control-implementations": [ { - "uuid": "315b07b8-67db-44e2-b2ad-ad430cca80ee", + "uuid": "32ca5808-af0b-4b83-8383-03075943f760", "source": "trestle://profiles/rhel10-hipaa-base/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -2107,7 +2107,7 @@ ], "implemented-requirements": [ { - "uuid": "519c83d6-0ab5-4cdb-bb6f-20339148f126", + "uuid": "4d940c2b-76fe-4338-9786-062319bb3dea", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -2179,7 +2179,7 @@ ] }, { - "uuid": "ad674065-1867-4405-8ef2-00c991917576", + "uuid": "f3865eb7-361f-4d2c-adeb-165fabb8abdb", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -2251,7 +2251,7 @@ ] }, { - "uuid": "6945ab07-6c59-4072-a35a-7e4667e4d969", + "uuid": "2d7dc230-15cf-40d5-ac93-fbec7d500bfa", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -2359,16 +2359,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "09d1bd85-3640-4263-94e9-a055f51a9813", + "uuid": "b247d82a-fc4c-43d2-8384-bb6e48748341", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -2385,7 +2380,7 @@ ] }, { - "uuid": "d5f19111-a70a-42f1-bad9-332bc4448d1e", + "uuid": "1e58964b-8b4d-4a0f-9833-c510f84a7c5c", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -2847,7 +2842,7 @@ ] }, { - "uuid": "4214f487-e6f2-48ca-ac4f-e4dfea757666", + "uuid": "88d781af-7257-43a9-85a7-61ebab7b66c2", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -2949,7 +2944,7 @@ ] }, { - "uuid": "64985937-b409-46a1-bad3-f9b5fc222ba5", + "uuid": "8b5dd88b-a57b-48c2-ba0c-31f596f17041", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -2966,7 +2961,7 @@ ] }, { - "uuid": "5d63c019-e723-4660-b483-009f92f26074", + "uuid": "1ab9595e-b5d6-4ac8-acf2-4cabc507d205", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -3079,16 +3074,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "96166097-672b-437a-9a5d-32c6706dee89", + "uuid": "70bc9fc3-7e6f-426a-8bb6-b0278414f9ee", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -3100,7 +3090,7 @@ ] }, { - "uuid": "0dee9841-7649-4f08-96a9-18694c55d36e", + "uuid": "bfd79449-2aa6-4d98-95f3-4feb5d2ec3ca", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -3202,7 +3192,7 @@ ] }, { - "uuid": "c08af81a-dff7-4e16-b54f-24e45f8860e3", + "uuid": "2b0acfdd-b452-47cc-b4e6-7613c9a306b0", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -3234,7 +3224,7 @@ ] }, { - "uuid": "38cee5a2-eeea-48d7-a51c-c767954354f6", + "uuid": "07a31e7f-f563-4c8f-b2d8-92156c938691", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -3396,7 +3386,7 @@ ] }, { - "uuid": "8f479f53-009c-4e15-8405-79e93f06b57a", + "uuid": "efc62a87-a83c-4ff7-b316-521cfee8b05d", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -3413,7 +3403,7 @@ ] }, { - "uuid": "8281586d-3988-48bf-8b74-97b38355e0f1", + "uuid": "44b22f67-59cb-4f11-9d17-478ec5e27fcf", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -3525,7 +3515,7 @@ ] }, { - "uuid": "76157817-7f59-48ed-a627-877d51a38aae", + "uuid": "10ad56b8-5fcf-4fd0-9363-e49460de1318", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -3547,7 +3537,7 @@ ] }, { - "uuid": "0e997d68-8219-428e-9b86-0a301f4f67c8", + "uuid": "158c6f08-649f-4ba3-97c0-3115edf3435b", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -3624,7 +3614,7 @@ ] }, { - "uuid": "28b35cff-dae9-4904-a2ea-d4fc71539ae5", + "uuid": "c633c621-9032-4ffe-85fb-ad1376432fb8", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -3651,7 +3641,7 @@ ] }, { - "uuid": "ea792365-5494-41c8-a468-7c755fab6195", + "uuid": "fe6f38b5-64e3-4dac-908f-76f1523e62d5", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -4163,7 +4153,7 @@ ] }, { - "uuid": "b731d4f5-2792-4b1e-9164-7d9213088055", + "uuid": "ce3d3a2d-01c6-46b6-89e3-b0e36ba4605a", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -4180,7 +4170,7 @@ ] }, { - "uuid": "838acbcf-6e65-4b0e-84dd-7b549d696c33", + "uuid": "d58c8d60-00cd-4498-93dc-f148e63198ff", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -4227,7 +4217,7 @@ ] }, { - "uuid": "7e1d07bb-76f2-4be5-94f7-d5f3b1e4be3d", + "uuid": "99267bcc-1239-41f7-9988-cb47ba7e6255", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -4674,7 +4664,7 @@ ] }, { - "uuid": "ab0e94a6-dc8c-4c8b-a835-8060ad014382", + "uuid": "b4a04898-4bad-432d-8f7d-63ebdc9dd738", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -5176,7 +5166,7 @@ ] }, { - "uuid": "b97d4c2a-8a82-43af-a571-dec5d0760c93", + "uuid": "f8b3e9d6-3900-4d09-8470-db67f51abb24", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -5289,16 +5279,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "91f4c76c-8856-491c-a945-f9a427ebdf81", + "uuid": "b55d0ca2-d6e1-4aef-a83d-a3a06516ef6b", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -5370,7 +5355,7 @@ ] }, { - "uuid": "73ac416e-e0aa-45fc-8338-dc5d885b1565", + "uuid": "4925aa24-9383-4b5d-938d-85f26d3c8ecc", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -5442,7 +5427,7 @@ ] }, { - "uuid": "448c101c-73ed-459a-8866-7b705502d12a", + "uuid": "7a265a46-f912-440d-8b76-a55dbb0646c9", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -5550,16 +5535,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ad0e4af0-93cc-4770-92f5-646e1f6fa2ac", + "uuid": "43040a63-89e8-4b4c-9c12-92d582a793dd", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -5576,7 +5556,7 @@ ] }, { - "uuid": "8cb7428d-3a07-4bb6-970d-33b716023a86", + "uuid": "863ff0f1-2a35-4a50-a366-4874dea16c43", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -6038,7 +6018,7 @@ ] }, { - "uuid": "b9b25f1f-8ceb-4579-8d18-1bacc2a7de3e", + "uuid": "47951aa8-4122-41e8-a4c1-02b98de1d7b7", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -6140,7 +6120,7 @@ ] }, { - "uuid": "a6f147f3-a548-4339-89b4-265a1c6107ab", + "uuid": "6557e6f4-685e-4c0b-abe6-72b3ad5e92de", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -6157,7 +6137,7 @@ ] }, { - "uuid": "358f5f5c-976f-40e9-be6d-ce074134f110", + "uuid": "f8bc203a-c8c1-4a79-9e0b-76c6e4010d0b", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -6270,16 +6250,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "3cfbd894-94f5-41b7-831f-9c2f1d32dea7", + "uuid": "d2808314-c746-4d40-a57f-29198cf31c2f", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -6291,7 +6266,7 @@ ] }, { - "uuid": "165f30e6-1452-4cc9-ad2d-ff3341f9c971", + "uuid": "a26dbe84-2a0b-453b-9c77-cf57bb9deaa7", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -6393,7 +6368,7 @@ ] }, { - "uuid": "956b9928-de5f-4e27-8f1d-5a1425a36560", + "uuid": "c72c20cc-6e41-4a43-b86e-b6edb5eec204", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -6425,7 +6400,7 @@ ] }, { - "uuid": "7b292d61-226d-4229-82a4-2c099efc34ab", + "uuid": "021494fc-fe41-4fd8-8b11-ca77764bcab6", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -6587,7 +6562,7 @@ ] }, { - "uuid": "fe892b08-ce22-4cd5-93b0-e0e33c232f57", + "uuid": "777c6d16-44fc-4f93-b513-19415c04dd3a", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -6604,7 +6579,7 @@ ] }, { - "uuid": "f8e73dba-aa30-41de-853b-99bd7d51a4f6", + "uuid": "91b4f4f9-7ab2-4636-94ae-878ba54ad73a", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -6716,7 +6691,7 @@ ] }, { - "uuid": "903d29d9-5bb3-4592-bbde-5c5f436ac81b", + "uuid": "6d317a26-43de-4d82-bad9-10b37aa02126", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -6738,7 +6713,7 @@ ] }, { - "uuid": "4700591b-bb89-4fd7-8dee-8f093b64c77b", + "uuid": "767ef84b-6a68-4728-9d79-4354e073ce88", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -6815,7 +6790,7 @@ ] }, { - "uuid": "4d48368f-bbff-4ce8-8f42-94b55d9ad6f9", + "uuid": "e3c8357b-b4d9-4d49-bf54-ec6103cc5a00", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -6842,7 +6817,7 @@ ] }, { - "uuid": "4add1049-77d9-4312-ab88-15732b57cd1b", + "uuid": "c1509873-da79-4bc3-aece-e45aba91f13b", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -7354,7 +7329,7 @@ ] }, { - "uuid": "1d9eaf2e-603e-45e6-9589-370ea79efcc9", + "uuid": "3df5aa0d-78e8-4884-9535-8a7382acd441", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -7371,7 +7346,7 @@ ] }, { - "uuid": "cd6a1f26-a8b8-415e-ab94-721704ea649c", + "uuid": "f83b90e4-45d8-42fe-bb5f-8db77932d3ee", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -7418,7 +7393,7 @@ ] }, { - "uuid": "8a42ac91-220a-4dcd-bf50-848c70e34d5f", + "uuid": "c3db0434-4552-4ae4-8d0c-f92b6097ac9e", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -7865,7 +7840,7 @@ ] }, { - "uuid": "b0832b28-4b41-4808-a40b-8b40e77a6707", + "uuid": "a4e2bd1f-f76c-4062-a4f9-6d07d908ef1d", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -8367,7 +8342,7 @@ ] }, { - "uuid": "9b52b0f2-8a2d-4580-ae32-7b06ca79c917", + "uuid": "0ea405d2-ba53-41e8-bc45-a0ec0a39511b", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -8480,16 +8455,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "9ce408f8-9b35-462d-82eb-793ed7bb3399", + "uuid": "ce2e623a-0534-4af9-b6ba-5b7b45578b7b", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -8561,7 +8531,7 @@ ] }, { - "uuid": "1f518479-c149-4e1f-9d8f-fb5df7ae17f3", + "uuid": "63a041d7-a081-48ba-a770-727d9e6f4d74", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -8633,7 +8603,7 @@ ] }, { - "uuid": "8f993f5e-8964-415e-97a8-974f60b3eb7e", + "uuid": "602f892d-2426-4b81-8f1b-38216972abcc", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -8741,16 +8711,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "6f1e971c-6654-45db-82c1-e0344d19f890", + "uuid": "f1ddc833-f7d0-4cf6-a21b-991ea6a040ba", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -8767,7 +8732,7 @@ ] }, { - "uuid": "4a89d28c-527b-4961-919b-23a8a3b0386a", + "uuid": "e1d471d3-7fe0-4992-9312-fd8a68204f5d", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -9229,7 +9194,7 @@ ] }, { - "uuid": "d220e350-9e4d-4ee6-8c41-cc88c5b1f284", + "uuid": "061556b2-fddd-4662-8029-cb12582d59e9", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -9331,7 +9296,7 @@ ] }, { - "uuid": "980a19b6-1785-43a9-b7b1-a9ada4e7f499", + "uuid": "86c2a1dd-f820-4947-a065-7e7bc381bec8", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -9348,7 +9313,7 @@ ] }, { - "uuid": "b2419ebd-91a9-48c7-b397-bf64abc85760", + "uuid": "1a572398-44fa-41c3-abc1-49257e0c5c01", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -9461,16 +9426,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "84c08512-7283-4601-bcc7-7a76151d7417", + "uuid": "c23957a7-64f1-465a-ac21-2fe745a11b90", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -9482,7 +9442,7 @@ ] }, { - "uuid": "e1084876-e74f-4abc-abcd-641a488ab553", + "uuid": "e23a50b6-5fcf-46fd-8f64-34a51aa63c27", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -9584,7 +9544,7 @@ ] }, { - "uuid": "06f352c5-ce3b-453f-8386-67023d6b4acc", + "uuid": "1a52532e-e1cd-49e8-9b6d-e6f5d4374c30", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -9616,7 +9576,7 @@ ] }, { - "uuid": "4501d6ed-5114-48c3-a62d-39bbfee43548", + "uuid": "078620bd-28f5-4176-9c28-8e654abf2c9f", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -9778,7 +9738,7 @@ ] }, { - "uuid": "8b4f4d46-c697-4046-bc70-f992cdf1a1c3", + "uuid": "0dbd0f3f-7bc0-4b74-8841-e21d01ee561b", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -9795,7 +9755,7 @@ ] }, { - "uuid": "82baa4e3-7532-4814-a20a-a5933dadad22", + "uuid": "6a14205f-7cb3-4c16-87a2-61ea78371c6d", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -9907,7 +9867,7 @@ ] }, { - "uuid": "86b8dbdc-d594-4266-b999-be45815d911d", + "uuid": "eb23c98c-cc61-46c4-be0a-c5c90fd73a6b", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -9929,7 +9889,7 @@ ] }, { - "uuid": "58fb593d-d2f9-4d9d-8470-4df17f12c9a2", + "uuid": "fb07afe9-3c11-43ef-a1ec-4d49792ed151", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -10006,7 +9966,7 @@ ] }, { - "uuid": "f37b021d-ebed-482f-be9c-a25dbe4c8064", + "uuid": "08166e00-c1e8-46d2-8c31-f7e255ae5268", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -10033,7 +9993,7 @@ ] }, { - "uuid": "00d0487a-1370-4471-ad2f-46ff9428741f", + "uuid": "ccc25115-90b8-4302-a3c3-bd7c199336c8", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -10545,7 +10505,7 @@ ] }, { - "uuid": "25fabac5-0408-4808-9af8-5c698ff492c8", + "uuid": "2a47cb54-483d-4125-b595-bc943ff6b38f", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -10562,7 +10522,7 @@ ] }, { - "uuid": "3f2a8e2e-1ad5-42fc-b116-9675b64c4b81", + "uuid": "ee52285e-edf8-457c-99e5-58023ac11c4b", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -10609,7 +10569,7 @@ ] }, { - "uuid": "c863a769-6ff0-4b93-a854-1175db6046db", + "uuid": "62fef9d5-b341-4983-af82-e4eff3227208", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -11056,7 +11016,7 @@ ] }, { - "uuid": "0e82ff3b-427d-4138-83e6-a02df3dc6d8d", + "uuid": "37c2d259-30d9-4d1f-b4ef-83edb7f06302", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -11558,7 +11518,7 @@ ] }, { - "uuid": "7c7823fe-8178-4fad-8a2f-a984eaedf45e", + "uuid": "65bf7d8d-fb8c-4831-b901-a8126519bb14", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -11671,11 +11631,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } @@ -14878,103 +14833,103 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -14986,7 +14941,7 @@ { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -14998,433 +14953,433 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { @@ -15694,7 +15649,7 @@ ], "control-implementations": [ { - "uuid": "6c756251-9d50-409f-b2c2-17636a51dce5", + "uuid": "25077abd-83f3-4f87-9f9a-fcb4d21ab809", "source": "trestle://profiles/rhel10-hipaa-base/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -15738,7 +15693,7 @@ ], "implemented-requirements": [ { - "uuid": "8a6f189e-69f7-4040-adb4-56619a1826f1", + "uuid": "56389b66-e287-4376-8f60-02cbfc17fcf2", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -15810,7 +15765,7 @@ ] }, { - "uuid": "bf4d340e-7fb5-4c3c-9869-f71256515f46", + "uuid": "30443cb2-fd02-4241-a29f-05c6a07ebab8", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -15882,7 +15837,7 @@ ] }, { - "uuid": "adf00766-fdc4-4946-a8ee-2673b6a48211", + "uuid": "a9ac732f-fd49-4444-bb39-871600a5b33e", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -15990,16 +15945,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "8d2bbf1c-86f9-41cc-92b3-ee15f5b43f4d", + "uuid": "0a348c74-d24c-4eac-bc2f-a9ff5afdba91", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -16016,7 +15966,7 @@ ] }, { - "uuid": "f83d9c05-e3af-4ecf-a20c-e3ca07316a7c", + "uuid": "fcc8720c-61fa-49ea-9742-7ba84bd2a00a", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -16478,7 +16428,7 @@ ] }, { - "uuid": "acf6ba9f-7d57-4c33-ad49-7bd9cfa9222a", + "uuid": "37ac44dc-9c22-4696-89db-1c13e1ef59db", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -16580,7 +16530,7 @@ ] }, { - "uuid": "29d6f4a4-4bfd-4ea7-95d8-cd754baaeced", + "uuid": "2deefa83-71e1-44d6-9d1d-2cf2c6400fb2", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -16597,7 +16547,7 @@ ] }, { - "uuid": "8c744849-76ac-4a7f-8939-2d6e7523655f", + "uuid": "ab948e60-5559-4c8e-8316-2e35266c595f", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -16710,16 +16660,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0ebb679c-b237-480a-8ef0-3c27fd5afceb", + "uuid": "655bd604-bf10-4f60-a362-15e095583338", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -16731,7 +16676,7 @@ ] }, { - "uuid": "b7cb697b-f8f1-4b12-bbc7-ef4a415659eb", + "uuid": "d9f9de71-793a-4d58-ba78-bfeaa03bfee9", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -16833,7 +16778,7 @@ ] }, { - "uuid": "b4342df4-2b18-4ca8-95e7-cdac5e299250", + "uuid": "687215a0-dac5-4cc0-97ef-3eb830e1c726", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -16865,7 +16810,7 @@ ] }, { - "uuid": "6c7bd906-8ad2-4095-8b80-4cc8ca8657a7", + "uuid": "13b92a2c-9ef0-406e-b065-8d1daeba459a", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -17027,7 +16972,7 @@ ] }, { - "uuid": "1497cd6d-9cbd-4284-a9b5-f780ad82125a", + "uuid": "a118b8af-f069-4e5b-9cca-c7248c827044", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -17044,7 +16989,7 @@ ] }, { - "uuid": "a825dc2c-7edf-498c-bc36-8f413bd865ac", + "uuid": "c99b9929-adee-4597-bc69-1448f5e88123", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -17156,7 +17101,7 @@ ] }, { - "uuid": "c01e9f61-cbba-46d4-a453-23412a17c49d", + "uuid": "f0cb1a89-0d77-48e4-bcc2-d9a5aefcefb0", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -17178,7 +17123,7 @@ ] }, { - "uuid": "82a18646-9a32-48a5-9503-ce3547a60992", + "uuid": "80c598f5-c391-48fa-b7ad-396eb4600994", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -17255,7 +17200,7 @@ ] }, { - "uuid": "e1355c99-0431-4b22-8edc-d29ea0d06ad0", + "uuid": "ff1ec1be-8884-4d91-a4b8-64863711409c", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -17282,7 +17227,7 @@ ] }, { - "uuid": "737f4117-601c-47a7-9f5f-c000656963f4", + "uuid": "1c7f0357-43e3-4f67-b0a6-0c56ce1168f4", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -17794,7 +17739,7 @@ ] }, { - "uuid": "7e53f2b3-e9ea-49f6-b71f-19e2c9586a7d", + "uuid": "e9a85053-13b9-4bc2-acbd-7367d2597fa0", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -17811,7 +17756,7 @@ ] }, { - "uuid": "5f17b6b9-6922-4f09-aef4-74960cbbb9b4", + "uuid": "452a3c26-c096-4780-8f08-930bca409bcc", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -17858,7 +17803,7 @@ ] }, { - "uuid": "e9413bc9-a26c-4325-8086-cad445531b74", + "uuid": "89ba59df-57ac-4252-81d3-bd76dee7752d", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -18305,7 +18250,7 @@ ] }, { - "uuid": "42bf4dd8-a208-42a4-9ad1-a8bd047efecb", + "uuid": "d3b88a0f-82f6-42f3-a361-f63751c31835", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -18807,7 +18752,7 @@ ] }, { - "uuid": "a77f1e70-c44a-4012-b74e-0e145e395055", + "uuid": "3745afe4-c96b-4165-aac6-cb543e2728c8", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -18920,16 +18865,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "380b055a-c818-4b6d-a49d-9cb43722bbe2", + "uuid": "03860c38-8907-404d-a0e7-3f2f440ef4fa", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -19001,7 +18941,7 @@ ] }, { - "uuid": "6449262d-4d36-4d09-a9cd-0803f9015d5c", + "uuid": "38ae1b7a-ad91-4834-8416-11fa90396207", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -19073,7 +19013,7 @@ ] }, { - "uuid": "71f6eed1-1df9-462b-9b98-efa6fc2e1837", + "uuid": "4ccfc37c-ab0e-4455-bde9-b0b1f308ed02", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -19181,16 +19121,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0d08f792-eb0f-462d-92b4-044cd5b4cf9f", + "uuid": "78861ca6-192b-4d21-92f5-f2d9e3409671", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -19207,7 +19142,7 @@ ] }, { - "uuid": "3a8dd027-94eb-47c1-b922-2d6f22b5f707", + "uuid": "67fd5168-75f2-46c5-8f2e-aeadf912504b", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -19669,7 +19604,7 @@ ] }, { - "uuid": "704e9499-5062-46d4-810c-094a02dd5945", + "uuid": "d90d1e3c-cc0e-44e4-acda-9ab61682f4d8", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -19771,7 +19706,7 @@ ] }, { - "uuid": "ea7b9c64-9861-4d12-883e-ca293452a583", + "uuid": "07e4093a-be9f-4ed9-963a-b7c5bb26004e", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -19788,7 +19723,7 @@ ] }, { - "uuid": "847b4387-4d8d-4e4f-a50c-bdda979672e8", + "uuid": "c479b64b-ed88-4149-b2bf-832f7d103a2c", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -19901,16 +19836,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "45cb66d2-c7a5-4f4b-9218-fa1189bc8392", + "uuid": "b1c7c983-19ce-4feb-a426-303bfe71301b", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -19922,7 +19852,7 @@ ] }, { - "uuid": "c036b1b5-ddbe-4c40-a9be-325754cc9fac", + "uuid": "d00d555a-af09-422c-b883-d8e59be8e7ad", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -20024,7 +19954,7 @@ ] }, { - "uuid": "cf10ce32-46ce-493c-8d35-921e85c4ae7c", + "uuid": "bca5f5e7-dc5b-4aa9-9477-58881c5f4f7b", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -20056,7 +19986,7 @@ ] }, { - "uuid": "ece5096e-b6e4-4b9b-81e3-9cdb4c1b8652", + "uuid": "70aff999-44ef-4445-9133-90650c7a5a8b", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -20218,7 +20148,7 @@ ] }, { - "uuid": "cfe95404-d16d-4f93-9714-d4e165dde867", + "uuid": "db9f4eb5-813e-48b0-8714-92119a7d2367", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -20235,7 +20165,7 @@ ] }, { - "uuid": "b923e40e-46d3-4baa-a6e3-0c072b0b987f", + "uuid": "6f08b218-cb56-42e4-905f-15a143cb5204", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -20347,7 +20277,7 @@ ] }, { - "uuid": "11c03e67-8e2a-4b73-a37f-bb3c965f3d95", + "uuid": "8c71eee6-c3c4-48c8-acc7-a015b9a6310e", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -20369,7 +20299,7 @@ ] }, { - "uuid": "870721c7-892f-48c8-a43f-e7dd984fa6b1", + "uuid": "3e3cb04a-448f-478c-81a6-5d21d40c3b43", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -20446,7 +20376,7 @@ ] }, { - "uuid": "f1778b9f-590c-44b9-a006-79f94f570253", + "uuid": "16876f5c-5864-4f89-8529-dd351b975aa7", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -20473,7 +20403,7 @@ ] }, { - "uuid": "d7315188-535a-445a-b447-96bbc5692530", + "uuid": "1cfc79f8-2d4e-429b-af7a-c1967b45292b", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -20985,7 +20915,7 @@ ] }, { - "uuid": "b0d18001-ab80-4a26-a935-76450acb3f38", + "uuid": "08e88f57-799b-4456-bda3-b9bf7222f962", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -21002,7 +20932,7 @@ ] }, { - "uuid": "3c971bad-e717-479a-ae05-114a1ace8dea", + "uuid": "cc444396-3382-41d7-bb40-3a0809b59431", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -21049,7 +20979,7 @@ ] }, { - "uuid": "1161e020-7d36-4592-92c0-ef4af1fd2fa8", + "uuid": "5e42c5de-7b18-420e-9ce8-ebedcd9f3b1b", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -21496,7 +21426,7 @@ ] }, { - "uuid": "ff6bc4c7-e534-4742-bb73-a550ed31c508", + "uuid": "3505d95b-ee21-4806-a937-4d831012b439", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -21998,7 +21928,7 @@ ] }, { - "uuid": "608c8c76-614d-408b-8647-8e18803b91b3", + "uuid": "ae466e0c-2597-4c4e-925b-c12a020ca538", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -22111,16 +22041,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "a1d3e4cb-c22b-4be0-9b84-bfadffe526d3", + "uuid": "57c7988d-0c48-4850-855a-d93ad782e602", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -22192,7 +22117,7 @@ ] }, { - "uuid": "fc4c0cf0-6d75-42a6-8c45-3b4e04b76d13", + "uuid": "52e64a7c-5aa5-4c4d-9274-025646036a8a", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -22264,7 +22189,7 @@ ] }, { - "uuid": "7b523c79-ed8d-4001-9807-a626563360f9", + "uuid": "e9389ded-134d-430a-9cc8-70cc10035277", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -22372,16 +22297,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "4ff7a008-eb57-456d-aefa-d60d86a74158", + "uuid": "4fd8910c-6ba9-45db-81b4-be238746bf55", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -22398,7 +22318,7 @@ ] }, { - "uuid": "3f0fcd9e-7a19-4f1e-875f-e069ec4e9520", + "uuid": "c13c3a3b-295d-4738-b563-d5e993835d7a", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -22860,7 +22780,7 @@ ] }, { - "uuid": "8da108e5-2f51-4d35-aed9-078f694bcd5c", + "uuid": "9411bbcc-0750-40dc-9c18-25f892604770", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -22962,7 +22882,7 @@ ] }, { - "uuid": "56583f99-5f01-4c2d-a038-f4b0021acba0", + "uuid": "1e20ce5f-f8bc-4bea-aeae-b5d78590c5b8", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -22979,7 +22899,7 @@ ] }, { - "uuid": "044a194f-b475-4cb8-bd28-980215a48d3f", + "uuid": "b26f8cda-ee76-41d1-af3d-99f60bce4cc7", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -23092,16 +23012,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "81bf33e0-834e-4a90-81b9-d65de1f5f316", + "uuid": "a261d350-70bf-4eb2-8290-ba79030ed280", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -23113,7 +23028,7 @@ ] }, { - "uuid": "4a49951d-c7c1-4e2c-9e78-148801828743", + "uuid": "9b135103-a42b-4255-a8e9-d4e27aedcc5b", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -23215,7 +23130,7 @@ ] }, { - "uuid": "caccbb99-314b-4ceb-9ebf-f51848ad58f0", + "uuid": "1c79ee9e-c4cb-420a-8a2b-37fe1545fa4a", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -23247,7 +23162,7 @@ ] }, { - "uuid": "aec1261d-4d12-4dcf-b6c3-5a1a2124d5e9", + "uuid": "a6186d05-3ece-4c59-a6c1-bcaf5435e3e8", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -23409,7 +23324,7 @@ ] }, { - "uuid": "f4268e78-4061-493f-a1a3-019cef657acc", + "uuid": "deb7966e-0673-4a79-bad0-c3e4c991abec", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -23426,7 +23341,7 @@ ] }, { - "uuid": "5f3dd9e8-5749-4d7d-a208-118c58366bfe", + "uuid": "be2820c4-31c1-4a72-b6b9-7a7996399766", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -23538,7 +23453,7 @@ ] }, { - "uuid": "f75ac5cc-cae5-4f95-ab88-020d6e79bc56", + "uuid": "a0985ee0-ae15-4f70-ab5a-b613954a5ce1", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -23560,7 +23475,7 @@ ] }, { - "uuid": "19a00be9-a51e-4c77-b7ab-ae5136c0e7fd", + "uuid": "35f94c76-1b08-4693-94cb-7faed0005858", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -23637,7 +23552,7 @@ ] }, { - "uuid": "14408973-a84b-4b42-b269-44363ef72c16", + "uuid": "5ab49b42-968a-4a0a-a492-9ed7cfbdb728", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -23664,7 +23579,7 @@ ] }, { - "uuid": "3fb6a655-6c0d-4780-a86f-5f3161b66bb7", + "uuid": "5643fcc1-fc76-4499-b62f-1e2bdc41c444", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -24176,7 +24091,7 @@ ] }, { - "uuid": "d0e5e073-1879-46b8-a236-33f1dd7b3f8e", + "uuid": "f6320865-f334-480f-bd4c-1162aa80d0de", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -24193,7 +24108,7 @@ ] }, { - "uuid": "582113ed-492c-421b-91eb-ba6e5d4b5496", + "uuid": "f42eed8d-519d-439c-8f24-6e2b5c7e6b10", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -24240,7 +24155,7 @@ ] }, { - "uuid": "42c2053e-2ce0-4441-bca1-d5bdb6e2a352", + "uuid": "988df8f8-b994-43e0-a81e-01575ac10ecd", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -24687,7 +24602,7 @@ ] }, { - "uuid": "1c50be85-5b22-4b1c-a0f5-662381773c03", + "uuid": "ae6e7109-dc48-4f9a-98ec-010f1afc8373", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -25189,7 +25104,7 @@ ] }, { - "uuid": "6ac66173-ec36-4f73-8f35-50108811be0a", + "uuid": "9c8f23ce-d3d2-43e9-a734-714a6bc30584", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -25302,11 +25217,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } diff --git a/component-definitions/rhel10/rhel10-hipaa-required/component-definition.json b/component-definitions/rhel10/rhel10-hipaa-required/component-definition.json index 409939583..84f8c68b3 100644 --- a/component-definitions/rhel10/rhel10-hipaa-required/component-definition.json +++ b/component-definitions/rhel10/rhel10-hipaa-required/component-definition.json @@ -3,8 +3,8 @@ "uuid": "d51516ee-864a-49d0-b7aa-a11a509963a8", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-09-28T09:00:42.747317+08:00", - "version": "1.1", + "last-modified": "2026-03-27T01:36:08.773828+00:00", + "version": "1.2", "oscal-version": "1.1.3" }, "components": [ @@ -1655,55 +1655,55 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -1715,217 +1715,217 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { @@ -2063,7 +2063,7 @@ ], "control-implementations": [ { - "uuid": "6eae33f5-8660-4798-8177-c4895d1e1c13", + "uuid": "6d42eb59-fac8-493a-ba0f-3284c1b6cbf0", "source": "trestle://profiles/rhel10-hipaa-required/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -2107,7 +2107,7 @@ ], "implemented-requirements": [ { - "uuid": "171f8d5c-1258-4d36-b188-656212bf13d5", + "uuid": "667b3922-6d36-402a-b2c2-6d1ff586a2e1", "control-id": "hipaa_164-308.a.1.ii.b", "description": "No notes for control-id 164.308(a)(1)(ii)(B).", "props": [ @@ -2214,7 +2214,7 @@ ] }, { - "uuid": "2feb2783-5523-447c-ba24-577f68511bb3", + "uuid": "b2bcbec2-4fce-4550-8826-a603e9e88406", "control-id": "hipaa_164-308.a.1.ii.d", "description": "No notes for control-id 164.308(a)(1)(ii)(D).", "props": [ @@ -2772,11 +2772,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "bec63836-ca79-4580-8f9e-8b606eafc15b", + "uuid": "4ec788fe-039a-4a78-ae47-f2656cda1f90", "control-id": "hipaa_164-308.a.3.ii.a", "description": "No notes for control-id 164.308(a)(3)(ii)(A).", "props": [ @@ -3228,7 +3233,7 @@ ] }, { - "uuid": "039175f6-45ff-4e9e-9988-7df889d8712c", + "uuid": "a3723916-9aea-4d45-9661-0af34175cd42", "control-id": "hipaa_164-308.a.6.ii", "description": "No notes for control-id 164.308(a)(6)(ii).", "props": [ @@ -3245,7 +3250,7 @@ ] }, { - "uuid": "91e94dfc-7c05-4a0f-8eea-9d103e7cb0ee", + "uuid": "e3e3a749-e1e0-4cc6-adea-4738de3c7020", "control-id": "hipaa_164-308.a.7.ii.a", "description": "No notes for control-id 164.308(a)(7)(ii)(A).", "props": [ @@ -3347,7 +3352,7 @@ ] }, { - "uuid": "a3462877-7727-4e51-89fa-93bde4bf9b4c", + "uuid": "12cfd606-07dd-473b-a2a1-717f03a3283e", "control-id": "hipaa_164-308.b.3", "description": "No notes for control-id 164.308(b)(3).", "props": [ @@ -3460,16 +3465,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "436e7349-621b-4d6e-b2ab-ace7ccedec06", + "uuid": "08616fd9-27b5-4a57-8b88-a8f6ad897d22", "control-id": "hipaa_164-312.a.2.i", "description": "No notes for control-id 164.312(a)(2)(i).", "props": [ @@ -3911,7 +3911,7 @@ ] }, { - "uuid": "5d2fe5d5-5659-4929-8ec1-fe5e1eafd110", + "uuid": "65ba9962-0c4b-46b8-ba49-34760f3c32e4", "control-id": "hipaa_164-312.a.2.ii", "description": "No notes for control-id 164.312(a)(2)(ii).", "props": [ @@ -3963,7 +3963,7 @@ ] }, { - "uuid": "12bfb669-418b-4055-96b7-e9ca4d558175", + "uuid": "cf90cb87-0a9a-41e6-b061-9c9d7f3d4751", "control-id": "hipaa_164-314.a.2.i.c", "description": "No notes for control-id 164.314(a)(2)(i)(C).", "props": [ @@ -3980,7 +3980,7 @@ ] }, { - "uuid": "34291dbd-d086-4652-9bb1-1d37d173dd8b", + "uuid": "b862c59a-a6b2-4f07-91a6-b46dbed3130f", "control-id": "hipaa_164-314.a.2.iii", "description": "No notes for control-id 164.314(a)(2)(iii).", "props": [ @@ -3997,7 +3997,7 @@ ] }, { - "uuid": "9f4bd5d9-161a-490e-aaca-385b0b531e8f", + "uuid": "f3a638d8-79bd-48d5-8c84-6d1905981a30", "control-id": "hipaa_164-314.b.2.i", "description": "No notes for control-id 164.314(b)(2)(i).", "props": [ @@ -4014,7 +4014,7 @@ ] }, { - "uuid": "9661f220-f226-4eae-9b7d-fd5299f6c964", + "uuid": "2838f387-7de1-4405-b919-5e50868a8ec3", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -4036,7 +4036,7 @@ ] }, { - "uuid": "11a94120-b8e3-4a5b-a51b-8ed897ef0060", + "uuid": "01b89d2c-0058-4716-ac89-9ff4e93f963f", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -4053,7 +4053,7 @@ ] }, { - "uuid": "3651cd17-97cd-4476-8ee7-5d3110a93a59", + "uuid": "4c47b9af-ce6b-4997-9a6b-cd89d03da0ef", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -4155,7 +4155,7 @@ ] }, { - "uuid": "c1ff9eac-0bb2-4f90-b318-c78ccda0473f", + "uuid": "260f0f47-6a87-4be6-828d-c92f6641a91f", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -4257,7 +4257,7 @@ ] }, { - "uuid": "acaf6b31-a3dc-4614-940a-e442b53687e0", + "uuid": "0b532c2a-fa98-4727-989e-d8f923c3e529", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -4359,7 +4359,7 @@ ] }, { - "uuid": "95956637-5e08-495e-a530-b37b77305d4f", + "uuid": "3591c8b8-5790-4722-8cd5-445a5ae6b302", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -4621,7 +4621,7 @@ ] }, { - "uuid": "78959ab5-6fcb-4f8e-aa8f-306045916bfe", + "uuid": "8a406f1a-7de4-4735-a828-f320f907c6f9", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -4748,7 +4748,7 @@ ] }, { - "uuid": "d415218f-67e5-4189-b442-b34f9bdfa32c", + "uuid": "6fdeed98-c523-48d8-be33-f597e34d3be5", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -4765,7 +4765,7 @@ ] }, { - "uuid": "ff522c31-6580-448f-9044-67cef2354686", + "uuid": "af0e6d98-43a7-4f04-85cb-0c7412211ad8", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -4792,7 +4792,7 @@ ] }, { - "uuid": "f4f6ef69-35d9-47ff-894a-041b348798b6", + "uuid": "048cafc6-d5da-4ffb-8976-bb84b7ac99d1", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -4839,7 +4839,7 @@ ] }, { - "uuid": "0f3269a5-73c9-4120-97a5-68338ef74d26", + "uuid": "5948994a-80ce-4fad-9e73-96a9fc30392c", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -4886,7 +4886,7 @@ ] }, { - "uuid": "163c823d-bd01-4841-aecc-1a1544d036b6", + "uuid": "68c26077-2176-4477-a700-a832ff034cd7", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -4999,16 +4999,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ff77f9c6-4a57-4214-b192-f7ba1f33744d", + "uuid": "154ff756-b34a-4b85-a0e9-6d604ada458b", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -5080,7 +5075,7 @@ ] }, { - "uuid": "94e4be7f-42f4-4c8c-9112-4addf5e30744", + "uuid": "1854ed49-5148-4c21-85ec-1a913464df05", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -5152,7 +5147,7 @@ ] }, { - "uuid": "94d7a7cc-a231-466c-92e9-ff9f884dcc04", + "uuid": "75b5cede-595f-4bda-ada0-9d70fe7501a5", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -5260,16 +5255,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "3bc3a669-86af-4272-8499-9117697acf0b", + "uuid": "fb9e2d23-b172-48b3-94a9-1b792ff99821", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -5286,7 +5276,7 @@ ] }, { - "uuid": "d365f2aa-c06a-4909-8d41-3fdd1f09e7b9", + "uuid": "e1d029dd-c88d-4651-bccc-c4a2967b520c", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -5748,7 +5738,7 @@ ] }, { - "uuid": "d9665a52-8284-4585-981d-1e1451652611", + "uuid": "b115d520-77fc-495c-8917-be2ca06e7f13", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -5850,7 +5840,7 @@ ] }, { - "uuid": "8e508b55-6236-4e93-b346-8bdb12cc6e3e", + "uuid": "3167ae64-14ed-49a4-857f-0d769e83ec18", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -5867,7 +5857,7 @@ ] }, { - "uuid": "a21fb666-242d-4795-8476-0e79a9d7728f", + "uuid": "2a1df4ca-7e53-4e69-8fd2-76e417c8320d", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -5980,16 +5970,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "f90852a0-35a3-4d91-af2d-a1c6eadab4c5", + "uuid": "f17f41b7-b4cc-4ab6-b501-0dd45db36b7e", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -6001,7 +5986,7 @@ ] }, { - "uuid": "6f80c827-a82a-43a2-990e-7ea5cf727803", + "uuid": "d38a73a0-d4d5-424e-91de-5a422926d157", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -6103,7 +6088,7 @@ ] }, { - "uuid": "d6d61cff-8df9-4984-a832-d3e8d7f70004", + "uuid": "ac662424-2c2e-4ea2-8d2a-7901fbba4eee", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -6135,7 +6120,7 @@ ] }, { - "uuid": "5a0577aa-3ed3-4939-b36b-c655a63291a2", + "uuid": "8265b7e0-543a-4010-8b05-f3f416b78df6", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -6297,7 +6282,7 @@ ] }, { - "uuid": "8853c8dd-4ce1-4b82-95d2-4712d4087505", + "uuid": "10454877-bbc1-4d9c-8bc0-c904df270bd6", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -6314,7 +6299,7 @@ ] }, { - "uuid": "0cd3667c-18c3-47e6-a6c1-220437784c80", + "uuid": "7f2efb45-9a5c-47c0-a0a8-6329d2f0e197", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -6426,7 +6411,7 @@ ] }, { - "uuid": "194d6728-b2e4-46e6-b114-e7d87c2e08de", + "uuid": "9732b365-4bc4-4ae3-baf8-5bf38f656a4e", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -6448,7 +6433,7 @@ ] }, { - "uuid": "8d9d43fb-e19a-4a87-b3cd-3d7e1c1539e3", + "uuid": "c8e6b06a-84ac-4283-a1b2-2eef6c89d837", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -6525,7 +6510,7 @@ ] }, { - "uuid": "a83c656b-73fa-4c7e-b829-069c91355450", + "uuid": "220c01b7-4228-4c84-a297-7e57ad562aab", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -6552,7 +6537,7 @@ ] }, { - "uuid": "6ef4d667-04ab-4403-ba8f-a86347431439", + "uuid": "525f8d4f-7abd-455d-a80b-9222bd53315c", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -7064,7 +7049,7 @@ ] }, { - "uuid": "00c7f1de-b2ff-4342-86a9-504119d857c0", + "uuid": "746fe774-d567-49a8-bf82-e27039604190", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -7081,7 +7066,7 @@ ] }, { - "uuid": "c686a95f-f269-41e2-a3fb-6c8f3ef9ae60", + "uuid": "93ea17ca-cba4-4f8a-ac4f-50716f23d94f", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -7128,7 +7113,7 @@ ] }, { - "uuid": "9e1db219-38c0-4a93-9e18-0fa653ff1330", + "uuid": "290ad331-2895-4101-8d0b-90975ca76b48", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -7575,7 +7560,7 @@ ] }, { - "uuid": "eb3d0ad4-279c-43ad-ac85-da0d55676328", + "uuid": "b478f6b0-ec50-4016-846b-29e8ae5c5fbc", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -8077,7 +8062,7 @@ ] }, { - "uuid": "0c566068-2252-4482-84f6-9277c4d983fc", + "uuid": "3f483f10-1876-4773-9227-113bf40ed369", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -8190,16 +8175,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ad5ec31e-7031-4e92-b4fc-1831ecf05b73", + "uuid": "ca200979-e41c-4853-b341-13cd7c29e454", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -8221,7 +8201,7 @@ ] }, { - "uuid": "ac0cb6d9-1f4d-4f98-ad21-85daa9273dcd", + "uuid": "9080481f-51e3-4f65-ae8f-9e1d8babe7e4", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -8238,7 +8218,7 @@ ] }, { - "uuid": "7d379de4-f7a3-4617-bf66-540ca3cf236c", + "uuid": "01f36348-da4c-4bf8-9acc-27dce5847256", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -8340,7 +8320,7 @@ ] }, { - "uuid": "65340299-1c30-43d0-adf3-7505c817f03f", + "uuid": "9e4bd734-deaa-4c21-ac1b-d386eaeacc82", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -8442,7 +8422,7 @@ ] }, { - "uuid": "522b6956-461a-4cac-ad38-60baad9bc819", + "uuid": "7bff7ee6-67c3-4df2-88d5-f072d03a583e", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -8544,7 +8524,7 @@ ] }, { - "uuid": "33b4fe34-3744-4fb2-8df7-c956fc5ab685", + "uuid": "7d4e6ada-5cf8-4c2a-93e6-84cf198e61fa", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -8806,7 +8786,7 @@ ] }, { - "uuid": "a2fd5ec8-075b-45b6-8cdf-ae02d8a1ee77", + "uuid": "f877630a-ccae-4053-9329-c544d0279c36", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -8933,7 +8913,7 @@ ] }, { - "uuid": "a134c5ef-827c-49a9-8339-95ce5d341581", + "uuid": "ee82349d-911e-40c4-bba2-e7f2edf09ae0", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -8950,7 +8930,7 @@ ] }, { - "uuid": "89f9f8d1-0a2a-4b31-8806-96a9931d4563", + "uuid": "a8737323-2475-461e-89e5-09d2110e7e21", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -8977,7 +8957,7 @@ ] }, { - "uuid": "e16fad73-3d17-4676-9dfa-0fea38e7243b", + "uuid": "e93350f3-ec82-4251-80d1-9c2c44bb2b98", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -9024,7 +9004,7 @@ ] }, { - "uuid": "b9e8345b-f12b-4fac-a38d-f618a837839f", + "uuid": "1f9a202a-6d81-42c1-b576-a5abb6df5197", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -9071,7 +9051,7 @@ ] }, { - "uuid": "ab45c09b-96da-4041-8f76-6adb26922304", + "uuid": "a37247a3-26d3-410a-81b0-80e2c9c0d7bd", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -9184,16 +9164,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "94f8e441-4949-4efc-9f14-22d86d6782a8", + "uuid": "b5a10463-2a68-496b-b021-b013ac35d7b8", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -9265,7 +9240,7 @@ ] }, { - "uuid": "4195c7f8-a8c4-42d0-a8e1-00d82a9c19e8", + "uuid": "6128b34c-2af0-4935-b2b2-79799d761227", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -9337,7 +9312,7 @@ ] }, { - "uuid": "81c4b6a3-88d9-488a-b184-064bebb3a19e", + "uuid": "ca4f2819-f913-404e-892e-788ca860babb", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -9445,16 +9420,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "81328c0e-0721-4910-b78c-ad6500d400a6", + "uuid": "206f2867-4611-44c1-bb91-3cf45350e9cb", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -9471,7 +9441,7 @@ ] }, { - "uuid": "f757119c-ae98-4bd8-9efb-a6f69046c36e", + "uuid": "7d9c56b9-019d-4167-b4d7-db2e49aa4841", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -9933,7 +9903,7 @@ ] }, { - "uuid": "a6500b5d-a7cc-4172-a5e1-a006e01efd5a", + "uuid": "e0cf16ad-27af-48b1-89ac-272403c0be33", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -10035,7 +10005,7 @@ ] }, { - "uuid": "436ddd53-5371-4e37-80d9-f2ead4715cf8", + "uuid": "42071adb-4339-477e-b1b2-4dfacb73b474", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -10052,7 +10022,7 @@ ] }, { - "uuid": "dc9acd73-26c5-404b-9094-71ccfeb2be33", + "uuid": "d653f445-baf4-42b7-ba8c-c41fabe510b1", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -10165,16 +10135,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "652093fd-bc51-4e31-9038-0b2065c1f240", + "uuid": "21fd4822-c285-4e74-890c-b4ec27ab7913", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -10186,7 +10151,7 @@ ] }, { - "uuid": "b982ebc6-93fa-4823-b6a0-61763194cdb3", + "uuid": "6fda6ff7-07b8-45ff-80a7-64f82b2fa8a5", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -10288,7 +10253,7 @@ ] }, { - "uuid": "d0362aff-89af-498a-9542-01f9167fc4ca", + "uuid": "336ab539-d7d0-4e75-bf20-0658181f4430", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -10320,7 +10285,7 @@ ] }, { - "uuid": "dcdd34db-5354-46ed-b231-f81a38aedba6", + "uuid": "8c0b68a9-3c2d-4dc5-99bd-cd9ea5fa7441", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -10482,7 +10447,7 @@ ] }, { - "uuid": "228df2cc-c457-4e07-9db9-1e32fa3a2923", + "uuid": "6a4c471d-580b-4f1d-b474-6a079c1f2e43", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -10499,7 +10464,7 @@ ] }, { - "uuid": "af86fad1-4bd6-484e-b29b-0b5f958ca636", + "uuid": "096216f8-4118-43de-8702-8101720a06d2", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -10611,7 +10576,7 @@ ] }, { - "uuid": "24283211-519d-4097-88ba-3241de0613c2", + "uuid": "0910bf06-730a-4e14-b5cb-17efc2a9f50a", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -10633,7 +10598,7 @@ ] }, { - "uuid": "f693cf1a-a7f9-48de-aa85-b91f530841c6", + "uuid": "34a24e2d-c3f8-47ec-95fa-dbd6895a1c88", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -10710,7 +10675,7 @@ ] }, { - "uuid": "670e8281-a709-4271-816f-341d40093fac", + "uuid": "74ab44ff-e13a-42bf-80fb-67572940982d", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -10737,7 +10702,7 @@ ] }, { - "uuid": "4c98128f-e6a5-4117-9cb4-b253ad5827b2", + "uuid": "00b5c38d-7c77-4faf-8c34-a037c4a93419", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -11249,7 +11214,7 @@ ] }, { - "uuid": "154a5c45-7a1a-4984-826a-f94d0d923415", + "uuid": "eedddad6-436d-4c39-ac65-5eb3d86d2ff6", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -11266,7 +11231,7 @@ ] }, { - "uuid": "ed1e2521-75c2-4e29-9b13-877ffe967f4f", + "uuid": "b8bb856c-b20c-4169-8ab0-dd3ea6d96b4a", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -11313,7 +11278,7 @@ ] }, { - "uuid": "c1cb1ad6-82f5-427c-b9b8-2712b4e8af2d", + "uuid": "2d61b4bb-5698-43f1-b4ac-873609fab4ff", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -11760,7 +11725,7 @@ ] }, { - "uuid": "a15eff9b-dfda-419a-a257-74ebf2472522", + "uuid": "e4575bbe-6202-4fce-b0c8-91fc57c799ab", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -12262,7 +12227,7 @@ ] }, { - "uuid": "d4982c97-fa24-4b5b-847c-c95c22616590", + "uuid": "7d0cf544-86ba-4b39-b028-ba185bb12b6b", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -12375,16 +12340,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "55066563-4ffa-4b89-b9ea-6792b35aeb30", + "uuid": "c7aa3a33-2834-44e4-952b-7d278f7f3cc5", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -12456,7 +12416,7 @@ ] }, { - "uuid": "ad8f650d-fc3b-47ba-94de-e2fac954fe19", + "uuid": "aadef83a-d879-495f-b855-7a0fe5a62bf9", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -12528,7 +12488,7 @@ ] }, { - "uuid": "ca6cea92-a28f-4f61-bce2-1a81fcf7bc9b", + "uuid": "5f179126-4ab1-4a5e-8a72-10fd4d98da4c", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -12636,16 +12596,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "225b3f93-af80-4ae5-9290-a59ab5dd6b28", + "uuid": "005eba53-9f6b-4aec-b4d2-170dc00dc171", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -12662,7 +12617,7 @@ ] }, { - "uuid": "02ee82ab-a787-476b-a59f-ecb8f4145c88", + "uuid": "8242a36d-436e-4170-a303-999a4c7a8fb3", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -13124,7 +13079,7 @@ ] }, { - "uuid": "cdc38fa3-003a-4aff-b462-b896f33f45fd", + "uuid": "8234691d-9e2f-4db4-ab53-79696de48007", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -13226,7 +13181,7 @@ ] }, { - "uuid": "a36be1fb-ede3-4981-8928-93aaa600e5c4", + "uuid": "295353d8-d6f2-473a-8451-4468b4fd0602", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -13243,7 +13198,7 @@ ] }, { - "uuid": "1d14fc4c-1a0a-4bba-9126-9358e72dedbd", + "uuid": "5f2a436a-c731-48b3-806b-79b05110e13e", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -13356,16 +13311,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "187e76a7-83b8-42f4-88c8-ad7adda52568", + "uuid": "dd9c0ea1-7145-490b-8f22-11cb3caf3dc3", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -13377,7 +13327,7 @@ ] }, { - "uuid": "4596a5f1-51bf-4f61-be79-7e540c52ee5f", + "uuid": "eb68895d-e590-4c46-80b9-fea08e1d79f5", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -13479,7 +13429,7 @@ ] }, { - "uuid": "42c75450-4cda-4a4d-9448-044fe29b3b8f", + "uuid": "0dbaf30f-3705-4341-afdf-89355e2f555e", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -13511,7 +13461,7 @@ ] }, { - "uuid": "a854eeb8-d448-4b14-b299-c072aaf6b734", + "uuid": "08bdf532-5447-42e2-83b3-3f23bdd4b07c", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -13673,7 +13623,7 @@ ] }, { - "uuid": "ec820c00-cc31-42d4-a7c7-f012e100e4fb", + "uuid": "e9ec9b22-644e-4730-a1fc-6ce46bb96c5e", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -13690,7 +13640,7 @@ ] }, { - "uuid": "2c316d54-2e29-4d2f-aadb-65b1dc06a590", + "uuid": "16bae86d-e989-41d7-9d6e-e6374aa06550", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -13802,7 +13752,7 @@ ] }, { - "uuid": "f2799bcb-0bd8-4595-9c9a-9982846b4348", + "uuid": "9014a804-f631-45d1-9934-614f025523b6", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -13824,7 +13774,7 @@ ] }, { - "uuid": "3a6d9188-12c2-4ef7-8116-ae33baced5dd", + "uuid": "5ff31286-0c7f-4af3-8337-a3d7c67d9666", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -13901,7 +13851,7 @@ ] }, { - "uuid": "52f66e65-e356-413b-bfcf-31043daf425e", + "uuid": "301d0e52-83d3-4e7d-b0b0-3d5ee11ecd3a", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -13928,7 +13878,7 @@ ] }, { - "uuid": "4014f57e-f8b4-48e4-b4e6-9fdae1eaf299", + "uuid": "f94495db-a743-4a98-9b80-121830b131ed", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -14440,7 +14390,7 @@ ] }, { - "uuid": "18481138-74ce-4f8a-80ec-0ef97af40840", + "uuid": "0519a152-8efd-478d-a5cd-88ec9d2f132b", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -14457,7 +14407,7 @@ ] }, { - "uuid": "f6ed9c21-d17a-41f8-8f08-fd25df8ba16a", + "uuid": "62bc5907-0fc4-4ac2-827f-9b5d5ddccf13", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -14504,7 +14454,7 @@ ] }, { - "uuid": "dd2e87b8-159d-460e-85be-ab73ef817e37", + "uuid": "2d19453f-c116-44ec-bf62-d385620b5415", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -14951,7 +14901,7 @@ ] }, { - "uuid": "05b209fc-9fd2-4741-b762-3d9517865197", + "uuid": "4d7dc1ea-085f-4c7b-9c15-d805e5240213", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -15453,7 +15403,7 @@ ] }, { - "uuid": "85397613-154c-4544-b9dc-d1b8bb815237", + "uuid": "c8812250-1f0b-4771-8cd0-553eed838c19", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -15566,11 +15516,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } @@ -18773,103 +18718,103 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Install sequoia-sq Package", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "service_autofs_disabled", "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Disable the Automounter", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cron_enabled", + "value": "package_cron_installed", "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Install the cron service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -18881,7 +18826,7 @@ { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "service_cron_enabled", "remarks": "rule_set_133" }, { @@ -18893,433 +18838,433 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_kerberos_security_all_exports", + "value": "service_crond_enabled", "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Kerberos Security on All Exports", + "value": "Enable cron Service", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "use_kerberos_security_all_exports", "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Use Kerberos Security on All Exports", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_telnet_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable telnet Service", + "value": "Remove telnet Clients", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "service_telnet_disabled", "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable telnet Service", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_compression", + "value": "disable_host_auth", "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Compression Or Set Compression to delayed", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_disable_compression", "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Disable Compression Or Set Compression to delayed", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts_rsa", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for Rhosts RSA Authentication", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_disable_rhosts_rsa", "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Disable SSH Support for Rhosts RSA Authentication", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_root_login", "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Root Login", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive_0", + "value": "sshd_set_keepalive", "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max to zero", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "libreswan_approved_tunnels", + "value": "sshd_set_keepalive_0", "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Any Configured IPSec Tunnel Connections", + "value": "Set SSH Client Alive Count Max to zero", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "libreswan_approved_tunnels", "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Verify Any Configured IPSec Tunnel Connections", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_151" }, { @@ -19589,7 +19534,7 @@ ], "control-implementations": [ { - "uuid": "99bad6d3-014c-4237-b50f-f95b2c873ca6", + "uuid": "4eb29aa3-c864-478c-9595-9eba5550920a", "source": "trestle://profiles/rhel10-hipaa-required/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -19633,7 +19578,7 @@ ], "implemented-requirements": [ { - "uuid": "ef04be24-7199-4eb6-b14f-142c37ac8ec8", + "uuid": "f999134c-6627-4983-90da-b435588a092f", "control-id": "hipaa_164-308.a.1.ii.b", "description": "No notes for control-id 164.308(a)(1)(ii)(B).", "props": [ @@ -19740,7 +19685,7 @@ ] }, { - "uuid": "5a49a8f8-68c2-4290-ab5c-04a695c71ca8", + "uuid": "1cf7bceb-c3bf-485b-81ab-44b2c46e5817", "control-id": "hipaa_164-308.a.1.ii.d", "description": "No notes for control-id 164.308(a)(1)(ii)(D).", "props": [ @@ -20298,11 +20243,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "6b93761c-ba6a-49ab-a406-4d8556d07371", + "uuid": "b787c824-832d-450d-ab14-0c84ade928e4", "control-id": "hipaa_164-308.a.3.ii.a", "description": "No notes for control-id 164.308(a)(3)(ii)(A).", "props": [ @@ -20754,7 +20704,7 @@ ] }, { - "uuid": "6ab5f26b-7f6f-41d5-9ad0-c468b4113704", + "uuid": "8cfa3a56-b77a-4507-9da2-ef7b259ba0c4", "control-id": "hipaa_164-308.a.6.ii", "description": "No notes for control-id 164.308(a)(6)(ii).", "props": [ @@ -20771,7 +20721,7 @@ ] }, { - "uuid": "dc769fb4-6657-4148-babe-afbcb49407e3", + "uuid": "9b9ba760-7321-43ba-876e-b9d94898da9d", "control-id": "hipaa_164-308.a.7.ii.a", "description": "No notes for control-id 164.308(a)(7)(ii)(A).", "props": [ @@ -20873,7 +20823,7 @@ ] }, { - "uuid": "7aa4339f-526d-433d-a53e-f1547b611668", + "uuid": "edeac9df-67f5-4e88-a584-d806eec1e9dc", "control-id": "hipaa_164-308.b.3", "description": "No notes for control-id 164.308(b)(3).", "props": [ @@ -20986,16 +20936,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "a46b5d0d-3582-4dea-939a-6f88f1ef4902", + "uuid": "e1a677b9-efcd-4e62-b681-89992a703d78", "control-id": "hipaa_164-312.a.2.i", "description": "No notes for control-id 164.312(a)(2)(i).", "props": [ @@ -21437,7 +21382,7 @@ ] }, { - "uuid": "21d0667e-50bc-4eae-a18e-df87b816f7ff", + "uuid": "af38b4cb-f83c-409a-87c9-113100d82a62", "control-id": "hipaa_164-312.a.2.ii", "description": "No notes for control-id 164.312(a)(2)(ii).", "props": [ @@ -21489,7 +21434,7 @@ ] }, { - "uuid": "a834065d-efdf-4ed9-9e43-d6c8def5dc7f", + "uuid": "79274dd1-1c7f-402b-a786-7e47bd7550eb", "control-id": "hipaa_164-314.a.2.i.c", "description": "No notes for control-id 164.314(a)(2)(i)(C).", "props": [ @@ -21506,7 +21451,7 @@ ] }, { - "uuid": "95e9a581-a9e7-4d59-8081-50c81bb052f5", + "uuid": "6710b00e-7f07-4d74-add5-d7b4c2afd02f", "control-id": "hipaa_164-314.a.2.iii", "description": "No notes for control-id 164.314(a)(2)(iii).", "props": [ @@ -21523,7 +21468,7 @@ ] }, { - "uuid": "d19ce584-c5ad-49a6-9270-5d0cbf2fbc6d", + "uuid": "0668f06c-fbb9-46f9-9f59-74996d437f62", "control-id": "hipaa_164-314.b.2.i", "description": "No notes for control-id 164.314(b)(2)(i).", "props": [ @@ -21540,7 +21485,7 @@ ] }, { - "uuid": "4e22e2c1-e34a-4b97-b7c5-a49e0d04bfc1", + "uuid": "f40cc34a-41a2-4503-8110-a374e2540429", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -21562,7 +21507,7 @@ ] }, { - "uuid": "3edc8ae3-23c4-4b22-973b-be791904e5fb", + "uuid": "2ff478c3-3bc8-4fbe-8d6f-20bba6b8fb5f", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -21579,7 +21524,7 @@ ] }, { - "uuid": "77775ab2-1b61-44d1-b1d5-6f0d477e1fe4", + "uuid": "94137027-0691-48df-b099-98e80313d1e8", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -21681,7 +21626,7 @@ ] }, { - "uuid": "95cd43b3-f630-4f92-9ee6-52339424cafe", + "uuid": "4c344cb4-0112-466b-9fbb-0842135b06df", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -21783,7 +21728,7 @@ ] }, { - "uuid": "10381857-fcaa-4618-9f8a-47bf375e98d2", + "uuid": "27c7063f-763f-450a-8b2f-402f247759ea", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -21885,7 +21830,7 @@ ] }, { - "uuid": "adab81ad-30bb-491e-8587-630a58d3538c", + "uuid": "bd5c4697-0194-4d70-bc8d-133dda5c2359", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -22147,7 +22092,7 @@ ] }, { - "uuid": "2239693f-371d-4b39-a07a-9779469aa6dc", + "uuid": "6bdc4457-5d0b-4cfc-be90-0486659a1a03", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -22274,7 +22219,7 @@ ] }, { - "uuid": "9403c32f-3e15-4c06-abf5-7bfe4c89a98a", + "uuid": "1ec56723-295e-439e-87b2-a7e9ea4c1467", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -22291,7 +22236,7 @@ ] }, { - "uuid": "195f5593-e2e5-4023-9c03-5a9b054e289e", + "uuid": "c7debe1b-0dbd-40c6-8ebd-cc6832aee2f7", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -22318,7 +22263,7 @@ ] }, { - "uuid": "db84fe22-877f-49c8-8262-11d36a19da14", + "uuid": "08f94e80-aa31-4c60-810e-62b67f08815d", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -22365,7 +22310,7 @@ ] }, { - "uuid": "cbfc4abf-356e-442f-aba3-f5b6f29b2d32", + "uuid": "a8ba5eea-2350-44bf-bdcf-609c4491866a", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -22412,7 +22357,7 @@ ] }, { - "uuid": "2f086960-5379-4c4a-aa2b-0546f9a17abb", + "uuid": "561d8ccd-b4dc-4a25-9aba-c5e0872a3166", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -22525,16 +22470,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "7eeab4b5-b949-408d-9b8a-05d634e8dbae", + "uuid": "3139e652-2ef8-4300-9fbb-c2074a20f3be", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -22606,7 +22546,7 @@ ] }, { - "uuid": "96b98de4-d154-4d6e-80be-f49570653001", + "uuid": "8f92703f-e455-4b89-9919-12265db20942", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -22678,7 +22618,7 @@ ] }, { - "uuid": "01efdfe9-b003-4287-b7ec-123b814f8cd6", + "uuid": "5249f60d-b995-4ccf-8e10-b9bd1dc6892a", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -22786,16 +22726,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "6b5279cb-ffec-4aa8-83e0-e53889a37694", + "uuid": "22e0ea6d-65cc-43e4-a39e-14d83c6f9495", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -22812,7 +22747,7 @@ ] }, { - "uuid": "06c54613-eda0-4228-9405-722e16c6ee63", + "uuid": "e10ef512-8986-46e4-8744-925f28a5b681", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -23274,7 +23209,7 @@ ] }, { - "uuid": "6ce6c843-da6e-4716-8696-ee114352edd2", + "uuid": "b428baeb-9ed8-4eb7-934d-09e5c7ce90d2", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -23376,7 +23311,7 @@ ] }, { - "uuid": "88b4d03d-830c-4512-a234-faa1748ed619", + "uuid": "5be3bc33-d82b-4801-87b5-3aee42b7bd7c", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -23393,7 +23328,7 @@ ] }, { - "uuid": "a83490d6-ed94-43a3-bdb1-ca70fdf7a2a3", + "uuid": "d023ef2f-d6a7-47b6-902b-076553ffb19c", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -23506,16 +23441,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "42143835-7b23-4ee9-931a-5bb8dd1a310b", + "uuid": "4107b59a-c383-4980-910b-2a434a663463", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -23527,7 +23457,7 @@ ] }, { - "uuid": "b18ca346-80b5-4260-9a04-a7c535b277ff", + "uuid": "e55ee7b1-9a28-4aed-aa34-eff5aa203356", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -23629,7 +23559,7 @@ ] }, { - "uuid": "72baa1b1-f6c9-4ce0-b17d-72a1dc730153", + "uuid": "0a2c9f03-bef6-47fa-ac32-b02f8db136a3", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -23661,7 +23591,7 @@ ] }, { - "uuid": "55133e76-a4ed-4fa5-84b2-e7befa92fbbe", + "uuid": "d0cecc7a-9d89-40f5-864b-3fe278b86f42", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -23823,7 +23753,7 @@ ] }, { - "uuid": "40304556-64c4-45fa-af3e-542be331a2a4", + "uuid": "fabef681-5917-4b88-8ce8-7aece99cd9b2", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -23840,7 +23770,7 @@ ] }, { - "uuid": "fda115f8-dc1c-49f0-a641-a193e6a2ed2d", + "uuid": "b9d6e563-3ac4-4863-8efa-772e2bb86507", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -23952,7 +23882,7 @@ ] }, { - "uuid": "e052256d-de25-449d-8300-1a8cebe75398", + "uuid": "5df4956b-bbac-45ee-bb81-2a551ab095b0", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -23974,7 +23904,7 @@ ] }, { - "uuid": "38ac1ca0-5b09-47c2-b366-2be90c65a3e8", + "uuid": "928d0c95-3a1d-4cc3-a902-02c5fd15259c", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -24051,7 +23981,7 @@ ] }, { - "uuid": "1a4a5927-4159-4ff7-977f-e4a155ad7dd2", + "uuid": "90314472-ef80-4c1f-8197-486c3a20acc5", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -24078,7 +24008,7 @@ ] }, { - "uuid": "17b77d63-1da7-4f45-b1d1-d36a35b52fec", + "uuid": "906c3c1c-d9f3-4fe0-ac1e-ee7d2ab757bb", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -24590,7 +24520,7 @@ ] }, { - "uuid": "6ceaab1b-97fc-411a-a6a8-8f6ec007e25a", + "uuid": "8604ba88-f62d-464a-ac28-1b92c79ed82a", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -24607,7 +24537,7 @@ ] }, { - "uuid": "25e54c64-46c8-4637-90e4-8369da7ac5b6", + "uuid": "0b512c81-df2e-4030-b940-69de5c03d1f5", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -24654,7 +24584,7 @@ ] }, { - "uuid": "be1cf272-20ab-4c68-a219-45d5303eec09", + "uuid": "80209ea3-6dfc-4f19-a239-b950c8e9d478", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -25101,7 +25031,7 @@ ] }, { - "uuid": "7cc71c24-6029-4fbb-accd-e20e2d98b737", + "uuid": "964e3f69-860f-476a-b1f9-33172107f747", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -25603,7 +25533,7 @@ ] }, { - "uuid": "2b545008-ae23-4cc4-8900-ac771e636d78", + "uuid": "e1a63810-c159-47b5-8e56-0c3e668e1d0a", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -25716,16 +25646,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "996ed9be-3335-439e-b539-eb76bf61cdd5", + "uuid": "d597f54e-458d-49bd-bd65-23895c28b073", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -25747,7 +25672,7 @@ ] }, { - "uuid": "d20f2eba-8369-4ee2-a4eb-dcc3ea00da48", + "uuid": "dfe63304-9916-4aad-8e4e-4f853e251419", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -25764,7 +25689,7 @@ ] }, { - "uuid": "01503ef5-54f2-4b42-a460-67ee26bda507", + "uuid": "1d5c459d-b565-4788-b3da-ddc64e38240d", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -25866,7 +25791,7 @@ ] }, { - "uuid": "efde9316-660b-4c02-bdc0-558c9811a3ad", + "uuid": "bada56a1-b078-44f0-8ac3-c1be723a9f0a", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -25968,7 +25893,7 @@ ] }, { - "uuid": "14d58e35-3cb3-496f-a2fa-62bf3783b118", + "uuid": "edb47672-3732-4ea1-ad68-df60c4f6d072", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -26070,7 +25995,7 @@ ] }, { - "uuid": "b64b1134-56b8-4a85-b8c5-f7c263863f62", + "uuid": "9ce243c4-6793-4cd6-9692-6b1eac0607de", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -26332,7 +26257,7 @@ ] }, { - "uuid": "83842746-f365-4737-ba51-f1e49f6a7330", + "uuid": "82620b47-623d-4f5d-991d-d9fcfcbe1af5", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -26459,7 +26384,7 @@ ] }, { - "uuid": "e83eb465-ef68-4104-b101-efd873ea592d", + "uuid": "3e641623-9f06-4944-b2f9-0068c6b59466", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -26476,7 +26401,7 @@ ] }, { - "uuid": "46e334f0-079a-412e-a886-da552f54f6cb", + "uuid": "feb8aa56-1372-46f0-9038-aeb308ab99a8", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -26503,7 +26428,7 @@ ] }, { - "uuid": "df46ed3c-30de-4e2c-ae69-d80ccfb07ea0", + "uuid": "9a915077-039a-4c96-b813-35d8b376ca3e", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -26550,7 +26475,7 @@ ] }, { - "uuid": "233055b7-0de2-4ca6-a262-7f3f6c9e0624", + "uuid": "2fb543f0-14a0-4002-a360-66ff688b8dd4", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -26597,7 +26522,7 @@ ] }, { - "uuid": "6e8be050-4096-48d0-9d2c-3a83602e1109", + "uuid": "17778779-c063-4794-8b62-236aec692ef6", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -26710,16 +26635,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0fa6424d-5f0a-4f8f-ad23-1b7b0284978e", + "uuid": "acdb51ad-dc35-49c1-865e-7b94a33c2d97", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -26791,7 +26711,7 @@ ] }, { - "uuid": "ffd26937-2c3c-4454-9d5c-a3cb6cf25a87", + "uuid": "c9a4b065-b850-4f7d-91d8-628fb224a0d0", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -26863,7 +26783,7 @@ ] }, { - "uuid": "ce441b90-7085-49bc-840f-3cbbf96283f9", + "uuid": "d0af2818-4505-4f8e-846d-02fcb5b8e41a", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -26971,16 +26891,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "04fa7d4f-7099-4bb7-a91b-7dad1402a811", + "uuid": "32bbc774-9edc-41e1-a48e-8ae2f48d651d", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -26997,7 +26912,7 @@ ] }, { - "uuid": "8acb9eb5-42a3-4dc8-a530-3ff393be5d06", + "uuid": "eefe4ca7-9b9d-4e76-8363-59b3dbd15644", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -27459,7 +27374,7 @@ ] }, { - "uuid": "4cebabf9-37d1-49db-ae44-54cf78702928", + "uuid": "5a8f9d1b-a8c7-4bad-8b81-d5e48a508fe2", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -27561,7 +27476,7 @@ ] }, { - "uuid": "b4999d75-ee45-4a22-adf2-1f4de4a11a2c", + "uuid": "be77d9c8-b6b2-4ad3-94ff-b918e3b09b1d", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -27578,7 +27493,7 @@ ] }, { - "uuid": "95f23476-a4fa-4579-9851-2df257c9dcf4", + "uuid": "94f2e242-b0ed-40d9-82ad-003d7da67841", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -27691,16 +27606,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "585fc9df-5188-49a6-bc58-0a7b43b7cef9", + "uuid": "b8d1b5aa-f95b-4285-ad1a-cef07c5b9762", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -27712,7 +27622,7 @@ ] }, { - "uuid": "c629e6a2-e128-4525-a31e-7872c3db5bb2", + "uuid": "5df00856-9209-4a35-b127-ba4db1517a2e", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -27814,7 +27724,7 @@ ] }, { - "uuid": "1563f095-6786-47a1-b5d3-dff498a55c97", + "uuid": "405196be-d7ed-4251-8987-e6f5e64857c4", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -27846,7 +27756,7 @@ ] }, { - "uuid": "040b8be5-ba52-4fdd-8f52-33a9b6509b6a", + "uuid": "00ee21c6-2198-4c4c-b993-8d16e2c7c20c", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -28008,7 +27918,7 @@ ] }, { - "uuid": "e0b9106b-97f8-471d-89bd-a1203b357de9", + "uuid": "dced8140-f1a3-4ff9-aa33-642386d8b64c", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -28025,7 +27935,7 @@ ] }, { - "uuid": "ddeab77c-f2df-42f5-920b-812761a4f4a5", + "uuid": "12254f3f-8be5-4fc2-bdc5-bb52a84e1a13", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -28137,7 +28047,7 @@ ] }, { - "uuid": "9ee0e78f-da3c-4c24-a43f-40cc4dc89d20", + "uuid": "9bd9beed-2c4c-41ab-b320-bfff0a996d3c", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -28159,7 +28069,7 @@ ] }, { - "uuid": "eeea5713-9656-440c-853e-4bd26736fed2", + "uuid": "7fc7c07d-5256-4011-828c-274d4d4042ce", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -28236,7 +28146,7 @@ ] }, { - "uuid": "24b5a811-f225-424b-9757-a58afba90a68", + "uuid": "7411a3d7-6736-412f-b371-34362060f482", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -28263,7 +28173,7 @@ ] }, { - "uuid": "50e2dfc2-b3da-4963-9757-0af0550a54e8", + "uuid": "c931b277-02b0-4377-ac3d-a84f97fabfe1", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -28775,7 +28685,7 @@ ] }, { - "uuid": "89dbec88-8159-4c94-b143-b4c67119ad53", + "uuid": "2c11ceb6-fc5d-4414-98e9-0df99d33d541", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -28792,7 +28702,7 @@ ] }, { - "uuid": "a3d0491c-5c90-4dcf-9c6d-4672ff6ac47a", + "uuid": "83f50ad9-ea17-446a-8865-f2c948d4ac9c", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -28839,7 +28749,7 @@ ] }, { - "uuid": "0ab419f1-0887-443c-846d-011d6a28f272", + "uuid": "7f783c14-950c-4796-99be-fb6e3dc5444e", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -29286,7 +29196,7 @@ ] }, { - "uuid": "904f7a59-f4ac-4c59-8321-91d2a5cc68c2", + "uuid": "58eddd6f-efb2-47ac-bbed-f1859cfc84c3", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -29788,7 +29698,7 @@ ] }, { - "uuid": "b31a31bc-7854-4d4d-9e04-d9de18566afe", + "uuid": "4b604639-2bca-4fbd-8e77-ad40ad047554", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -29901,16 +29811,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "4875489a-80bd-438d-8fdc-916a423ecac2", + "uuid": "48d2ac81-1c20-4509-bfd9-c7db7618deec", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -29982,7 +29887,7 @@ ] }, { - "uuid": "8363479a-cd08-4ec3-b9a8-6688f2015f21", + "uuid": "f412c76f-f54f-44c0-a538-75e068523be7", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -30054,7 +29959,7 @@ ] }, { - "uuid": "7dac422a-9e7c-4288-aa43-c997f7b2fdc9", + "uuid": "cfa1bd87-ce91-4181-ad7c-7925a953f3d7", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -30162,16 +30067,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0e7849ef-2194-4a0e-becd-d3b8a9f6e9c5", + "uuid": "e5ca4310-15ba-44cb-ba9f-7b9e4355def5", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -30188,7 +30088,7 @@ ] }, { - "uuid": "cc21137b-a567-43b5-92b9-e20830a43375", + "uuid": "9170c01b-1c81-4ddb-b8ab-434f63473fa2", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -30650,7 +30550,7 @@ ] }, { - "uuid": "a5333344-5dbe-43ab-a336-969a113c0793", + "uuid": "5c2c82ae-6494-4d77-bad8-1922ef295eee", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -30752,7 +30652,7 @@ ] }, { - "uuid": "af37d803-5b9f-474b-807c-4583acb48083", + "uuid": "87aa1b2b-d98b-4e09-9647-8d0bb0bab459", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -30769,7 +30669,7 @@ ] }, { - "uuid": "2724f31e-db3a-4579-954e-0f1ffc853abb", + "uuid": "c153bb33-8cfc-4df2-8150-e549143f4af6", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -30882,16 +30782,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "7abe3c67-655f-4e56-bd67-9cd0d074f20e", + "uuid": "b6b70093-b343-482c-a34a-02268b1aa8bb", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -30903,7 +30798,7 @@ ] }, { - "uuid": "3e37c720-8c64-4be9-b836-2fb6ad09e9e8", + "uuid": "1cec53d2-95aa-4f65-8006-1fae6aee82ef", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -31005,7 +30900,7 @@ ] }, { - "uuid": "e2893431-5e57-403a-9a00-c3bd38123a4b", + "uuid": "804c87ea-6a45-4b35-9b56-d684efdf4e79", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -31037,7 +30932,7 @@ ] }, { - "uuid": "ea09981f-a146-4571-9fa8-aa173cd3d294", + "uuid": "37d2b0b6-99d8-4a50-b9b3-ec8a209910ee", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -31199,7 +31094,7 @@ ] }, { - "uuid": "fa84e74d-6576-45ed-b01c-1a59020d9a72", + "uuid": "9ad4a1f5-d2f6-4657-858e-f4cac743243c", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -31216,7 +31111,7 @@ ] }, { - "uuid": "0e94c04b-f69c-495e-af39-16da6ca74bd1", + "uuid": "4d4193db-a9b2-477f-bc27-eb20f4b321fb", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -31328,7 +31223,7 @@ ] }, { - "uuid": "7751a602-4439-4983-887b-5ad37a04f3a7", + "uuid": "f9ad09ea-5d60-4b32-9663-15429de37b43", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -31350,7 +31245,7 @@ ] }, { - "uuid": "5a66902b-2451-4237-8841-fe5936bfe3bc", + "uuid": "037d5e53-626f-470a-920c-817c597ccced", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -31427,7 +31322,7 @@ ] }, { - "uuid": "4a8d82eb-ff04-4bcd-8169-9ecab85bf343", + "uuid": "7139e220-a3c8-4d9f-b653-14203c2cc64e", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -31454,7 +31349,7 @@ ] }, { - "uuid": "dda6be02-b797-4e66-946d-2f2d83759f1f", + "uuid": "90463b9a-56fb-4835-80a3-1e64238e2dc7", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -31966,7 +31861,7 @@ ] }, { - "uuid": "6d9bd1e6-3f44-40b4-bb86-ded305e995e2", + "uuid": "b6dd220f-0517-419e-b12c-a72a0d8c4591", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -31983,7 +31878,7 @@ ] }, { - "uuid": "34b2342b-5ac2-4435-a06f-4233f80d6e4c", + "uuid": "598ee2ae-5b1b-4883-9506-d9696037ddd3", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -32030,7 +31925,7 @@ ] }, { - "uuid": "3aaea56d-c490-4498-ac21-a2e4fc72925a", + "uuid": "301c279c-c230-4e9e-a12f-405a832c62ac", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -32477,7 +32372,7 @@ ] }, { - "uuid": "040397c4-0c4b-46f0-92fd-34bb48284ec8", + "uuid": "1e5bede9-0146-412b-ab29-446e328a95d5", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -32979,7 +32874,7 @@ ] }, { - "uuid": "53e57381-2164-4148-ab53-72ffb2230b06", + "uuid": "2844a66b-fd7b-4d5c-a493-f8c52c763687", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -33092,11 +32987,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } diff --git a/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json b/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json index 2fd15d567..229624e7a 100644 --- a/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json +++ b/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "e263ec70-49b2-459f-bfae-283464b2cdcb", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2026-01-05T17:35:18.000156+00:00", - "version": "1.7", + "last-modified": "2026-03-27T01:40:37.662456+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -311,7 +311,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -2039,1567 +2039,1555 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "coredump_disable_backtraces", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Disable core dump backtraces", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "coredump_disable_storage", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Disable storing core dump", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "disable_users_coredumps", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_kernel_core_pattern", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Disable storing core dumps", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_core_pattern", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dumps", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "package_cryptsetup-luks_installed", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Install cryptsetup Package", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cryptsetup-luks_installed", + "value": "ensure_redhat_gpgkey_installed", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install cryptsetup Package", + "value": "Ensure Red Hat GPG Key Installed", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_redhat_gpgkey_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Red Hat GPG Key Installed", + "value": "Install sequoia-sq Package", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sequoia-sq_installed", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sequoia-sq Package", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "account_unique_id", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "account_unique_name", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "group_unique_id", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "group_unique_name", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "gid_passwd_group_same", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "dconf_db_up_to_date", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_db_up_to_date", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_screensaver_idle_activation_enabled", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Enable GNOME3 Screensaver Idle Activation", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_activation_enabled", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Idle Activation", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_lock_enabled", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Enable GNOME3 Screensaver Lock After Idle Period", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_enabled", + "value": "dconf_gnome_screensaver_mode_blank", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Lock After Idle Period", + "value": "Implement Blank Screensaver", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_mode_blank", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Blank Screensaver", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "sshd_set_keepalive", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "disable_host_auth", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "gnome_gdm_disable_automatic_login", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable GDM Automatic Login", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_automatic_login", + "value": "gnome_gdm_disable_guest_login", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Automatic Login", + "value": "Disable GDM Guest Login", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_guest_login", + "value": "no_empty_passwords", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Guest Login", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_unix_remember", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Limit Password Reuse", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_remember", + "value": "accounts_password_pam_pwhistory_remember_password_auth", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse", + "value": "Limit Password Reuse: password-auth", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_password_auth", + "value": "accounts_password_pam_pwhistory_remember_system_auth", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: password-auth", + "value": "Limit Password Reuse: system-auth", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_system_auth", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: system-auth", + "value": "Set Password Maximum Age", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "accounts_password_set_max_life_existing", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Set Existing Passwords Maximum Age", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_max_life_existing", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Maximum Age", + "value": "Set Password Warning Age", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_password_set_warn_age_existing", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_warn_age_existing", + "value": "accounts_tmout", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Warning Age", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_direct_root_logins", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "securetty_root_login_console_only", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Restrict Virtual Console Root Logins", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "securetty_root_login_console_only", + "value": "audit_rules_suid_privilege_function", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Virtual Console Root Logins", + "value": "Record Events When Privileged Executables Are Run", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_privilege_function", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Privileged Executables Are Run", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_login_events_tallylog", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Logon and Logout Events - tallylog", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_tallylog", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - tallylog", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_186" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_186" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_187" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_251" + "remarks": "rule_set_250" } ], "control-implementations": [ { - "uuid": "4779a6da-6150-4929-8109-06b753a76fca", + "uuid": "2478cdee-dbdc-4cea-9421-fd2d8e858968", "source": "trestle://profiles/rhel10-pcidss_4-base/profile.json", "description": "Control implementation for pci-dss", "props": [ @@ -3799,7 +3787,7 @@ ], "implemented-requirements": [ { - "uuid": "09b34302-3303-455b-b753-e4c6e03e572b", + "uuid": "8446987d-a124-4e6c-b2a0-ab439a41015a", "control-id": "pcidss_4_1-1.1", "description": "The description for control-id pcidss_4_1-1.1.", "props": [ @@ -3812,7 +3800,7 @@ ] }, { - "uuid": "26bb7bae-8100-4c0f-9d49-bebecd9a7e69", + "uuid": "82336435-2581-4cd8-8a54-16ba2220368b", "control-id": "pcidss_4_1-1.2", "description": "The description for control-id pcidss_4_1-1.2.", "props": [ @@ -3825,7 +3813,7 @@ ] }, { - "uuid": "465e0763-da72-466d-b52f-dfacc0ac538e", + "uuid": "7b9332dd-7832-4ffc-933b-96465d4df004", "control-id": "pcidss_4_1-2.1", "description": "Examples of NSCs covered by these configuration standards include, but are not limited to,\nfirewalls, routers configured with access control lists, and cloud virtual networks. The\nobjective of this requirement is to ensure the way that NSCs are configured and operate\nare defined and consistently applied. While the tooling and standards can be automated,\nthe review of allowed accesses should be manual as different sites may have different\npolicies.", "props": [ @@ -3857,7 +3845,7 @@ ] }, { - "uuid": "b69fa2b1-3bb7-4bef-adf8-040b08cc6239", + "uuid": "aad44e11-930b-4b25-a6e0-b5984fd55cc8", "control-id": "pcidss_4_1-2.2", "description": "The description for control-id pcidss_4_1-2.2.", "props": [ @@ -3870,7 +3858,7 @@ ] }, { - "uuid": "45da60f8-f894-42b4-bb6a-dd08bf5e0446", + "uuid": "a475682b-8032-49e3-9e39-98d39eba4007", "control-id": "pcidss_4_1-2.3", "description": "The description for control-id pcidss_4_1-2.3.", "props": [ @@ -3883,7 +3871,7 @@ ] }, { - "uuid": "8630de18-1c14-4625-b0d7-431175526c75", + "uuid": "4f65b3b5-1ed3-4d6c-98a4-ee7b33418524", "control-id": "pcidss_4_1-2.4", "description": "The description for control-id pcidss_4_1-2.4.", "props": [ @@ -3896,7 +3884,7 @@ ] }, { - "uuid": "020e0b13-a298-488f-bfe0-6bf42da71843", + "uuid": "b2b7a019-9b09-499a-bc41-f8f16dddaae7", "control-id": "pcidss_4_1-2.5", "description": "The description for control-id pcidss_4_1-2.5.", "props": [ @@ -3909,7 +3897,7 @@ ] }, { - "uuid": "42d2ae87-4d76-4824-99ce-002bad579fef", + "uuid": "c406658b-af67-483d-b1d2-a12ced3b004c", "control-id": "pcidss_4_1-2.6", "description": "The specific risks associated with the use of insecure services, protocols, and ports are\nunderstood, assessed, and appropriately mitigated. The selected rules here basically\nremove services without encryption and restricted some common services.", "props": [ @@ -3946,7 +3934,7 @@ ] }, { - "uuid": "74142d39-c48c-4ea5-a171-e7f6790026a9", + "uuid": "254ef92a-f654-495a-bd79-8777832aa5b5", "control-id": "pcidss_4_1-2.7", "description": "The description for control-id pcidss_4_1-2.7.", "props": [ @@ -3959,7 +3947,7 @@ ] }, { - "uuid": "7ee51e07-8a1a-4368-bf33-ea2d66a75601", + "uuid": "7245cf47-f475-4c5c-bd8a-0f5964d2198b", "control-id": "pcidss_4_1-2.8", "description": "No notes for control-id 1.2.8.", "props": [ @@ -3991,7 +3979,7 @@ ] }, { - "uuid": "52cfefd0-9f3f-4210-b938-d850e1d892bc", + "uuid": "9ffc68ab-fa0c-4e19-9031-41d34efcc0cf", "control-id": "pcidss_4_1-3.1", "description": "No notes for control-id 1.3.1.", "props": [ @@ -4013,7 +4001,7 @@ ] }, { - "uuid": "48f6144c-752e-4bce-828f-26ffba93116a", + "uuid": "b9a8cd9f-881b-428f-a3a1-1aaf091666ac", "control-id": "pcidss_4_1-3.2", "description": "The description for control-id pcidss_4_1-3.2.", "props": [ @@ -4026,7 +4014,7 @@ ] }, { - "uuid": "900ae6ed-bd01-4e44-8457-c3d2ae528e91", + "uuid": "d31e0a72-91c8-43bc-ab40-48ed8b3ad1a3", "control-id": "pcidss_4_1-3.3", "description": "Wireless interfaces are not expected in servers so they are disabled by default in this\npolicy.", "props": [ @@ -4043,7 +4031,7 @@ ] }, { - "uuid": "c79cb6d9-b2e6-47e1-81bb-9c7e2ce891d1", + "uuid": "c4d464b6-f4e8-47bf-bb74-68af64f83c23", "control-id": "pcidss_4_1-4.1", "description": "Trusted and untrusted networks are expected to be different for each environment.\nBut loopback traffic is assumed to be trusted and even necessary for some services.\nThis requirement is complements 1.2.1 and 1.3.1 requirements.", "props": [ @@ -4065,7 +4053,7 @@ ] }, { - "uuid": "5cb1be33-e5d7-4b03-a8da-0d46bc1d8108", + "uuid": "502dffe2-1271-40bd-ad0d-6e90f63b0599", "control-id": "pcidss_4_1-4.2", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -4102,7 +4090,7 @@ ] }, { - "uuid": "40b09b2b-99b1-45f6-af89-0aa2ce300b33", + "uuid": "68993bb4-3cac-4f87-bc8c-6c080ac9da88", "control-id": "pcidss_4_1-4.3", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -4139,7 +4127,7 @@ ] }, { - "uuid": "4a0d4934-d510-4418-b179-85e4b2a6be52", + "uuid": "014a6211-4756-4794-b95d-480f6ea8f34a", "control-id": "pcidss_4_1-4.4", "description": "The description for control-id pcidss_4_1-4.4.", "props": [ @@ -4152,7 +4140,7 @@ ] }, { - "uuid": "7e0681d2-f4e9-4a92-9aba-aed06cc6db23", + "uuid": "ea945cae-43db-4a6c-98d2-e38858516bb1", "control-id": "pcidss_4_1-4.5", "description": "No notes for control-id 1.4.5.", "props": [ @@ -4179,7 +4167,7 @@ ] }, { - "uuid": "30932674-b2e3-4b6d-be0d-121774862e4b", + "uuid": "226a7a85-588b-4cb7-8aca-a657b9f8451f", "control-id": "pcidss_4_1-5.1", "description": "To ensure this requirement, a manual analysis of site policy and topology is inevitable.\nFrom the technical perspective, previous requirements should already cover this\nrequirement at some level.", "props": [ @@ -4191,7 +4179,7 @@ ] }, { - "uuid": "a103140b-cb2e-4d5c-b8d2-9abc07f8efce", + "uuid": "834313a5-e192-4ac7-a9f4-299affda8c6c", "control-id": "pcidss_4_2-1.1", "description": "The description for control-id pcidss_4_2-1.1.", "props": [ @@ -4204,7 +4192,7 @@ ] }, { - "uuid": "8df47bf8-d610-497d-ac6c-2835c0e50bb2", + "uuid": "d82b6f87-4559-4ff5-8756-350ac26c04e2", "control-id": "pcidss_4_2-1.2", "description": "The description for control-id pcidss_4_2-1.2.", "props": [ @@ -4217,7 +4205,7 @@ ] }, { - "uuid": "cb85f7a9-05dd-4b72-8862-fbb1b09de910", + "uuid": "0f5976c5-559d-4c82-8754-d60cdc7d5414", "control-id": "pcidss_4_2-2.1", "description": "Interestingly this requirement recommends other standards, such as Center for Internet\nSecurity (CIS), International Organization for Standardization (ISO), National Institute\nof Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the\nrules included here are very generic in terms of hardening.", "props": [ @@ -4234,7 +4222,7 @@ ] }, { - "uuid": "b92ff121-9a73-4b27-80ee-3e4af67c2ad9", + "uuid": "db86450e-eeaf-4efa-9468-89c13ace4dd7", "control-id": "pcidss_4_2-2.2", "description": "Also related to requirement 8.2.6 and 8.3.5.", "props": [ @@ -4256,7 +4244,7 @@ ] }, { - "uuid": "1d1e3829-44e1-4420-8eec-9cc424977c30", + "uuid": "93c02090-1c84-43e7-a5db-311e31d1d54e", "control-id": "pcidss_4_2-2.3", "description": "The description for control-id pcidss_4_2-2.3.", "props": [ @@ -4269,7 +4257,7 @@ ] }, { - "uuid": "b6646005-1a9c-4523-878d-c78f9c426176", + "uuid": "283a0387-c3d3-49e8-b5e5-b274c07582bb", "control-id": "pcidss_4_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -4326,7 +4314,7 @@ ] }, { - "uuid": "47ecfb75-1af9-458d-9363-d220a388ffa3", + "uuid": "21c09c80-75b1-467d-822d-b46b0e977683", "control-id": "pcidss_4_2-2.5", "description": "The description for control-id pcidss_4_2-2.5.", "props": [ @@ -4339,7 +4327,7 @@ ] }, { - "uuid": "632c3492-ebb6-4201-85a8-245400a2d23b", + "uuid": "359e6b84-0846-45fc-acb1-59104bab15d6", "control-id": "pcidss_4_2-2.6", "description": "This requirement is not specific but also points to 2.2.1, where other policies are\nreferenced. Therefore, the most common rules related to system configuration in order to\nprevent misuse and selected in main profiles are also selected here.", "props": [ @@ -4741,7 +4729,7 @@ ] }, { - "uuid": "3f933195-12ad-4f0f-8903-744e80edfa7e", + "uuid": "f97bde80-4f27-41fa-aca8-bca950ab4bcb", "control-id": "pcidss_4_2-2.7", "description": "Related to requirement 12.3.3.", "props": [ @@ -4754,16 +4742,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ceb70ffc-571c-4bfc-b20f-274c3f769b19", + "uuid": "4fd064a9-4ad5-40f9-9535-1c8e01790331", "control-id": "pcidss_4_2-3.1", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -4775,7 +4758,7 @@ ] }, { - "uuid": "0973befc-e335-4852-a27b-661cf909e1d0", + "uuid": "92b3ad14-1749-44c1-a0dc-e2ea04bf6584", "control-id": "pcidss_4_2-3.2", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -4787,7 +4770,7 @@ ] }, { - "uuid": "d2b4dc97-8b0a-4a90-b867-fd003e86c18e", + "uuid": "4101e396-5fc3-4e11-a6a8-8a8fe4a1c658", "control-id": "pcidss_4_3-1.1", "description": "The description for control-id pcidss_4_3-1.1.", "props": [ @@ -4800,7 +4783,7 @@ ] }, { - "uuid": "d522ad70-09c8-4369-a8a4-f0e7bcefe1c7", + "uuid": "8c6a6058-217e-490d-be5b-94ebff75567b", "control-id": "pcidss_4_3-1.2", "description": "The description for control-id pcidss_4_3-1.2.", "props": [ @@ -4813,7 +4796,7 @@ ] }, { - "uuid": "a0d404f8-5eab-45c6-bdc8-defcd241fc02", + "uuid": "0eaa7778-1035-4a80-b818-227002284402", "control-id": "pcidss_4_3-2.1", "description": "The description for control-id pcidss_4_3-2.1.", "props": [ @@ -4826,7 +4809,7 @@ ] }, { - "uuid": "3f28624c-6ee0-4f02-a5d3-a03515362d17", + "uuid": "4527e4a6-00a9-4396-a232-336b504b6df9", "control-id": "pcidss_4_3-3.1.1", "description": "This requirement consists in auditing files, databases and memory to make sure the full\ncontent of any track is not unnecessarily stored. It involves manual auditing but some\nautomated rules fit this requirement in order to reduce the chances if this data be\nunintentionally stored in memory.", "props": [ @@ -4868,7 +4851,7 @@ ] }, { - "uuid": "c7c3e795-634d-4f59-9322-7b9acf6e4c64", + "uuid": "f37cc75a-f0dc-4942-8eb5-4e6d624702fb", "control-id": "pcidss_4_3-3.1.2", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -4880,7 +4863,7 @@ ] }, { - "uuid": "4fe6df5f-c572-4b62-bdcb-e6e2b1f9f5fd", + "uuid": "bf007943-4443-4871-a1ff-19c232ae1368", "control-id": "pcidss_4_3-3.1.3", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -4892,7 +4875,7 @@ ] }, { - "uuid": "2b97ff47-a592-46bc-b3b9-625fd48f8ca1", + "uuid": "b908aa0d-cb83-4eb0-bce8-adfac5494428", "control-id": "pcidss_4_3-3.2", "description": "The description for control-id pcidss_4_3-3.2.", "props": [ @@ -4905,7 +4888,7 @@ ] }, { - "uuid": "31802b14-6fba-4fcd-ae09-98f90291e143", + "uuid": "1a497019-9060-423d-a7ff-30cdf6f62a68", "control-id": "pcidss_4_3-3.3", "description": "The description for control-id pcidss_4_3-3.3.", "props": [ @@ -4918,7 +4901,7 @@ ] }, { - "uuid": "9b4d9003-7416-4c71-96a7-f06dcf820b5c", + "uuid": "93db78f6-6810-450b-8469-58a12ef46f66", "control-id": "pcidss_4_3-4.1", "description": "The description for control-id pcidss_4_3-4.1.", "props": [ @@ -4931,7 +4914,7 @@ ] }, { - "uuid": "eaa65782-4ca5-4877-b6fc-4ada1375f023", + "uuid": "4e8c0141-8eb3-41fc-96d6-e8da77c43b8a", "control-id": "pcidss_4_3-4.2", "description": "There are technical rules to disable removable storage devices. However, this requirement\nstill demand some manual auditing in documentation and eventual exceptions.", "props": [ @@ -4958,7 +4941,7 @@ ] }, { - "uuid": "f5dbc0ce-933c-4132-ad98-3142ddfb7bb2", + "uuid": "f5f986a6-2724-4314-ad00-3273feb379e0", "control-id": "pcidss_4_3-5.1.1", "description": "The description for control-id pcidss_4_3-5.1.1.", "props": [ @@ -4971,7 +4954,7 @@ ] }, { - "uuid": "2b36f7ad-1144-44bf-870b-dc4c47d5a599", + "uuid": "b9a59056-471c-4e8d-8ac0-982688ba098b", "control-id": "pcidss_4_3-5.1.2", "description": "No notes for control-id 3.5.1.2.", "props": [ @@ -4988,7 +4971,7 @@ ] }, { - "uuid": "9f4a700b-42bb-4555-8d78-e8c05239387d", + "uuid": "83fcef8d-068e-4913-9292-c61ddc43223e", "control-id": "pcidss_4_3-5.1.3", "description": "The description for control-id pcidss_4_3-5.1.3.", "props": [ @@ -5001,7 +4984,7 @@ ] }, { - "uuid": "71757b85-193c-4055-b209-d63d9f20e682", + "uuid": "dcd7d8b7-081a-4589-b10d-b9cde414c649", "control-id": "pcidss_4_3-6.1.1", "description": "The description for control-id pcidss_4_3-6.1.1.", "props": [ @@ -5014,7 +4997,7 @@ ] }, { - "uuid": "b2158d4c-34d8-4995-b3fd-4f3fe784bca5", + "uuid": "bdca11aa-a7aa-4e22-84ce-875d3e81627d", "control-id": "pcidss_4_3-6.1.2", "description": "The description for control-id pcidss_4_3-6.1.2.", "props": [ @@ -5027,7 +5010,7 @@ ] }, { - "uuid": "667b6cf5-e131-4eac-aec5-bceb3f554b97", + "uuid": "b2ceb398-b002-4102-a3e8-f93a52d976a3", "control-id": "pcidss_4_3-6.1.3", "description": "The description for control-id pcidss_4_3-6.1.3.", "props": [ @@ -5040,7 +5023,7 @@ ] }, { - "uuid": "ec9c6862-cc89-4cc8-8330-ed41090b0d7e", + "uuid": "73548ea4-80fb-42df-9913-18238ed90134", "control-id": "pcidss_4_3-6.1.4", "description": "The description for control-id pcidss_4_3-6.1.4.", "props": [ @@ -5053,7 +5036,7 @@ ] }, { - "uuid": "ec34d477-b131-491a-a179-d4eb15261e5c", + "uuid": "58d5dfa4-0360-43bf-b566-42e5949e1718", "control-id": "pcidss_4_3-7.1", "description": "The description for control-id pcidss_4_3-7.1.", "props": [ @@ -5066,7 +5049,7 @@ ] }, { - "uuid": "3b1322fc-6a64-46ba-a25b-7668b0f9322f", + "uuid": "f33135fb-7d37-4e7a-9139-e5e81dfcc8b1", "control-id": "pcidss_4_3-7.2", "description": "The description for control-id pcidss_4_3-7.2.", "props": [ @@ -5079,7 +5062,7 @@ ] }, { - "uuid": "d379ad8e-b14a-4dae-8cc8-5b33d8dbc8e3", + "uuid": "a26ea4e9-9ce5-4dc9-968c-34ae7be1c569", "control-id": "pcidss_4_3-7.3", "description": "The description for control-id pcidss_4_3-7.3.", "props": [ @@ -5092,7 +5075,7 @@ ] }, { - "uuid": "49f9482f-8c86-40be-a67e-3228a85eb39f", + "uuid": "847036c9-1467-4d33-b212-1bf8f5a1c5b7", "control-id": "pcidss_4_3-7.4", "description": "The description for control-id pcidss_4_3-7.4.", "props": [ @@ -5105,7 +5088,7 @@ ] }, { - "uuid": "2efc6811-38bd-467f-af9c-b7130fa295a4", + "uuid": "8297cafa-68ea-4964-8035-ae4dbfee4379", "control-id": "pcidss_4_3-7.5", "description": "The description for control-id pcidss_4_3-7.5.", "props": [ @@ -5118,7 +5101,7 @@ ] }, { - "uuid": "055d258a-5d8e-48eb-8886-deeb51d5a712", + "uuid": "7e0a98a6-7fc2-48a5-a857-06945838da70", "control-id": "pcidss_4_3-7.6", "description": "The description for control-id pcidss_4_3-7.6.", "props": [ @@ -5131,7 +5114,7 @@ ] }, { - "uuid": "aed9eae8-17f7-4ea7-8506-5430ab9e75d0", + "uuid": "f584536a-b8c9-4c06-8041-e2cd336920cc", "control-id": "pcidss_4_3-7.7", "description": "The description for control-id pcidss_4_3-7.7.", "props": [ @@ -5144,7 +5127,7 @@ ] }, { - "uuid": "1d062fb0-519e-48b8-b3cf-57a917a00245", + "uuid": "f4848040-47af-4dd3-bc10-94241ef93954", "control-id": "pcidss_4_3-7.8", "description": "The description for control-id pcidss_4_3-7.8.", "props": [ @@ -5157,7 +5140,7 @@ ] }, { - "uuid": "61c17fc7-8193-4055-b68f-0aa33c2f4be4", + "uuid": "c5eb3f50-ba50-45ae-8513-4f56a2fa2e2a", "control-id": "pcidss_4_3-7.9", "description": "The description for control-id pcidss_4_3-7.9.", "props": [ @@ -5170,7 +5153,7 @@ ] }, { - "uuid": "39361890-8b3a-482e-8525-17f8a7208700", + "uuid": "0ede21e9-8619-47c3-9afb-89555660151f", "control-id": "pcidss_4_4-1.1", "description": "The description for control-id pcidss_4_4-1.1.", "props": [ @@ -5183,7 +5166,7 @@ ] }, { - "uuid": "be801bff-6e92-4357-a104-64468ac87c62", + "uuid": "76c1acef-cdc9-48eb-80ad-4763fc444ebe", "control-id": "pcidss_4_4-1.2", "description": "The description for control-id pcidss_4_4-1.2.", "props": [ @@ -5196,7 +5179,7 @@ ] }, { - "uuid": "494499f9-a161-47a1-9163-52463ab40808", + "uuid": "a464f99a-c243-4e02-b9af-8307d19a37a7", "control-id": "pcidss_4_4-2.1.1", "description": "The description for control-id pcidss_4_4-2.1.1.", "props": [ @@ -5209,7 +5192,7 @@ ] }, { - "uuid": "ee1578f2-7886-4fc4-981f-eabab90a59e9", + "uuid": "b0dda612-40e1-4113-a7eb-b7921948a6b3", "control-id": "pcidss_4_4-2.1.2", "description": "The description for control-id pcidss_4_4-2.1.2.", "props": [ @@ -5222,7 +5205,7 @@ ] }, { - "uuid": "3b4f50bc-50a8-484c-a0cd-371dfc9447c2", + "uuid": "da2c2df2-e552-4613-a14f-cbd7b8198db8", "control-id": "pcidss_4_4-2.2", "description": "The description for control-id pcidss_4_4-2.2.", "props": [ @@ -5235,7 +5218,7 @@ ] }, { - "uuid": "a22f7414-05cc-4435-8710-d6ca1319e45d", + "uuid": "2611b94a-0c2a-425f-90af-d371613eb095", "control-id": "pcidss_4_5-1.1", "description": "The description for control-id pcidss_4_5-1.1.", "props": [ @@ -5248,7 +5231,7 @@ ] }, { - "uuid": "31858cb9-9e7f-45ad-8a1f-6225b6bd4afd", + "uuid": "ea77d212-ee33-43c3-9b69-14a9e2f30b27", "control-id": "pcidss_4_5-1.2", "description": "The description for control-id pcidss_4_5-1.2.", "props": [ @@ -5261,7 +5244,7 @@ ] }, { - "uuid": "d7ceff20-03e5-4e1b-8334-f8d625cfefbb", + "uuid": "2c4877ba-8be1-421e-adb0-aef877221392", "control-id": "pcidss_4_5-2.1", "description": "There are many options of anti-malware and the criteria for any adopted solution or\napproach relies on each site policy. Technologies are supported but manual assessment is\nrequired.", "props": [ @@ -5273,7 +5256,7 @@ ] }, { - "uuid": "710c0473-e64e-449a-8393-7e9f01e121d0", + "uuid": "347e86fb-1419-439c-ae38-f9fd572253a8", "control-id": "pcidss_4_5-2.2", "description": "The description for control-id pcidss_4_5-2.2.", "props": [ @@ -5286,7 +5269,7 @@ ] }, { - "uuid": "6d50cafb-4ad0-42be-87c4-f616eee84647", + "uuid": "34469e0a-8e76-4bfc-a118-25cd6dd8b254", "control-id": "pcidss_4_5-2.3.1", "description": "The description for control-id pcidss_4_5-2.3.1.", "props": [ @@ -5299,7 +5282,7 @@ ] }, { - "uuid": "ef7f7b61-d83f-4a09-9d50-14d064c669ab", + "uuid": "1a766253-77e5-4f56-aee0-ef7059bbbda3", "control-id": "pcidss_4_5-3.1", "description": "The description for control-id pcidss_4_5-3.1.", "props": [ @@ -5312,7 +5295,7 @@ ] }, { - "uuid": "9b5f606b-b061-4b54-8302-fe09ee417204", + "uuid": "81ada649-1533-4aa0-9f01-dbadebe906d6", "control-id": "pcidss_4_5-3.2.1", "description": "The description for control-id pcidss_4_5-3.2.1.", "props": [ @@ -5325,7 +5308,7 @@ ] }, { - "uuid": "71366f05-eb6a-4c66-ba77-9cf6b03dab90", + "uuid": "739f583a-ce2a-430e-9b64-cc1b2b5080ed", "control-id": "pcidss_4_5-3.3", "description": "The description for control-id pcidss_4_5-3.3.", "props": [ @@ -5338,7 +5321,7 @@ ] }, { - "uuid": "ea7a54da-6fd0-4fd1-9843-353cb219959b", + "uuid": "c9c9e5de-a64d-446a-958d-9c3ca866c2f0", "control-id": "pcidss_4_5-3.4", "description": "The description for control-id pcidss_4_5-3.4.", "props": [ @@ -5351,7 +5334,7 @@ ] }, { - "uuid": "30552798-8021-4029-8502-fbf5d1e68791", + "uuid": "4094a801-939c-4867-b383-ed138eee3897", "control-id": "pcidss_4_5-3.5", "description": "The description for control-id pcidss_4_5-3.5.", "props": [ @@ -5364,7 +5347,7 @@ ] }, { - "uuid": "4858287c-2c42-4b36-82c5-55de505922b6", + "uuid": "9d459a11-ff3b-417a-b875-aa67c728bc4c", "control-id": "pcidss_4_5-4.1", "description": "The description for control-id pcidss_4_5-4.1.", "props": [ @@ -5377,7 +5360,7 @@ ] }, { - "uuid": "2dee6113-bd47-4e37-86de-8f013f200ae1", + "uuid": "c70770ef-7d13-4d07-a018-dcc530294703", "control-id": "pcidss_4_6-1.1", "description": "The description for control-id pcidss_4_6-1.1.", "props": [ @@ -5390,7 +5373,7 @@ ] }, { - "uuid": "99ab4986-5ee5-418a-9a38-c546afb0e3eb", + "uuid": "c600314e-b14c-46ce-9e70-ce8f06817cd2", "control-id": "pcidss_4_6-1.2", "description": "The description for control-id pcidss_4_6-1.2.", "props": [ @@ -5403,7 +5386,7 @@ ] }, { - "uuid": "1e6c05de-4933-4376-b889-b4f675b8e1ed", + "uuid": "03112a19-408a-42a6-839c-8efe35c45846", "control-id": "pcidss_4_6-2.1", "description": "The description for control-id pcidss_4_6-2.1.", "props": [ @@ -5416,7 +5399,7 @@ ] }, { - "uuid": "95d4832d-87a6-4d0c-9d80-6d4f0736c11a", + "uuid": "bba6982d-7b64-48db-a239-68b711cd2450", "control-id": "pcidss_4_6-2.2", "description": "The description for control-id pcidss_4_6-2.2.", "props": [ @@ -5429,7 +5412,7 @@ ] }, { - "uuid": "7d14eb4e-481c-437c-898a-4b437f49fc8c", + "uuid": "e57eb61e-c6f9-49ca-9adc-726a620b3ca0", "control-id": "pcidss_4_6-2.3.1", "description": "The description for control-id pcidss_4_6-2.3.1.", "props": [ @@ -5442,7 +5425,7 @@ ] }, { - "uuid": "a703ba20-c683-4c14-854a-2ead162792de", + "uuid": "c846a1f2-f4db-4076-8111-144d3f18bfb7", "control-id": "pcidss_4_6-2.4", "description": "The description for control-id pcidss_4_6-2.4.", "props": [ @@ -5455,7 +5438,7 @@ ] }, { - "uuid": "b978c13d-255d-459d-b1ad-d8d3b93029c0", + "uuid": "9c229226-c3b9-4507-b94d-0baf1072cfca", "control-id": "pcidss_4_6-3.1", "description": "The description for control-id pcidss_4_6-3.1.", "props": [ @@ -5468,7 +5451,7 @@ ] }, { - "uuid": "4c7220e1-dd84-466c-90cd-8545f499bd1f", + "uuid": "db7d189c-0622-4ee2-b6d2-f405816988e9", "control-id": "pcidss_4_6-3.2", "description": "The description for control-id pcidss_4_6-3.2.", "props": [ @@ -5481,7 +5464,7 @@ ] }, { - "uuid": "69cee302-ddc2-4c6c-a90d-48975c8f799d", + "uuid": "a1e9e5c0-e065-4f0a-97e6-db659e657d72", "control-id": "pcidss_4_6-3.3", "description": "No notes for control-id 6.3.3.", "props": [ @@ -5513,7 +5496,7 @@ ] }, { - "uuid": "4825843e-471c-4477-bc3b-283a5be21de9", + "uuid": "0f68ed0d-d281-4d94-98c5-8b4aca4ff508", "control-id": "pcidss_4_6-4.1", "description": "The description for control-id pcidss_4_6-4.1.", "props": [ @@ -5526,7 +5509,7 @@ ] }, { - "uuid": "c1fc573c-d4dc-4190-a31e-57db8b3f6861", + "uuid": "7a31cc3e-60f7-46a4-9fd2-21a24e50d403", "control-id": "pcidss_4_6-4.2", "description": "The description for control-id pcidss_4_6-4.2.", "props": [ @@ -5539,7 +5522,7 @@ ] }, { - "uuid": "03395da0-ef36-4e44-80cc-415be3184c5f", + "uuid": "fb96d628-00a2-4a36-b2cb-da935a352fd6", "control-id": "pcidss_4_6-4.3", "description": "The description for control-id pcidss_4_6-4.3.", "props": [ @@ -5552,7 +5535,7 @@ ] }, { - "uuid": "73e500cb-884e-4dbc-9c08-bc70e2fadf4c", + "uuid": "f5181dd8-d3f3-465c-a0d2-aef61eb3aa62", "control-id": "pcidss_4_6-5.1", "description": "The description for control-id pcidss_4_6-5.1.", "props": [ @@ -5565,7 +5548,7 @@ ] }, { - "uuid": "dd34710a-af3a-40cf-ab15-a2a93d209749", + "uuid": "1b7152be-bca0-489c-a890-919f98a879ac", "control-id": "pcidss_4_6-5.2", "description": "The description for control-id pcidss_4_6-5.2.", "props": [ @@ -5578,7 +5561,7 @@ ] }, { - "uuid": "67860641-cfe9-419e-8958-ffed1a77a187", + "uuid": "8c96676b-7d11-4f55-9bee-f2d958c6f486", "control-id": "pcidss_4_6-5.3", "description": "The description for control-id pcidss_4_6-5.3.", "props": [ @@ -5591,7 +5574,7 @@ ] }, { - "uuid": "01032535-b9d2-46e7-9f6a-6df16b081225", + "uuid": "146d4f3c-685b-460e-b8f9-6835b839dfbb", "control-id": "pcidss_4_6-5.4", "description": "The description for control-id pcidss_4_6-5.4.", "props": [ @@ -5604,7 +5587,7 @@ ] }, { - "uuid": "17ddd318-3b02-4782-9a7b-e7804933aef5", + "uuid": "5fd2e978-6f41-45e1-b56d-9cf75bead69a", "control-id": "pcidss_4_6-5.5", "description": "The description for control-id pcidss_4_6-5.5.", "props": [ @@ -5617,7 +5600,7 @@ ] }, { - "uuid": "32b12843-d548-4b91-a231-7b36a8aac1f2", + "uuid": "26bc7748-f6fa-4217-a113-a2a7d1bf8e1e", "control-id": "pcidss_4_6-5.6", "description": "The description for control-id pcidss_4_6-5.6.", "props": [ @@ -5630,7 +5613,7 @@ ] }, { - "uuid": "c124b4e9-672b-4177-957e-0aca38347a0d", + "uuid": "187bb97d-18a5-46e8-86a9-80ef622ce77e", "control-id": "pcidss_4_7-1.1", "description": "The description for control-id pcidss_4_7-1.1.", "props": [ @@ -5643,7 +5626,7 @@ ] }, { - "uuid": "2d2e07f1-a89c-488a-b9cd-e1551af4fe5d", + "uuid": "1b29ca77-4a47-4b1e-a9f6-51c987a4b457", "control-id": "pcidss_4_7-1.2", "description": "The description for control-id pcidss_4_7-1.2.", "props": [ @@ -5656,7 +5639,7 @@ ] }, { - "uuid": "41cd3797-1015-43df-bfe8-3f294c87ae9e", + "uuid": "c13ddb32-45ae-4a9e-843f-3925b8f0bee5", "control-id": "pcidss_4_7-2.1", "description": "The description for control-id pcidss_4_7-2.1.", "props": [ @@ -5669,7 +5652,7 @@ ] }, { - "uuid": "2cd3ab9d-0e26-4ad2-8c61-3ec647616c8b", + "uuid": "1338cc5c-bc37-4e57-ac54-f9d5fda3c4ce", "control-id": "pcidss_4_7-2.2", "description": "The description for control-id pcidss_4_7-2.2.", "props": [ @@ -5682,7 +5665,7 @@ ] }, { - "uuid": "59580ec7-73ed-47d6-a5e8-1b2789d041f6", + "uuid": "4845842d-107c-4929-b963-4275b54ca546", "control-id": "pcidss_4_7-2.3", "description": "The description for control-id pcidss_4_7-2.3.", "props": [ @@ -5695,7 +5678,7 @@ ] }, { - "uuid": "c0322567-aed0-42a7-9ac1-ada29c842061", + "uuid": "08de11fa-e0d1-44ee-80ac-492d2dcc9cb4", "control-id": "pcidss_4_7-2.4", "description": "The description for control-id pcidss_4_7-2.4.", "props": [ @@ -5708,7 +5691,7 @@ ] }, { - "uuid": "f9b49b3f-325a-4c71-955b-a7cb9241eb7f", + "uuid": "4aacb12c-0795-421d-8e48-0b188c759c04", "control-id": "pcidss_4_7-2.5.1", "description": "The description for control-id pcidss_4_7-2.5.1.", "props": [ @@ -5721,7 +5704,7 @@ ] }, { - "uuid": "65b1afdd-1128-4bc0-99a4-cc34398069d4", + "uuid": "f0ad389e-d1ad-4fef-b223-accca5358ee9", "control-id": "pcidss_4_7-2.6", "description": "The description for control-id pcidss_4_7-2.6.", "props": [ @@ -5734,7 +5717,7 @@ ] }, { - "uuid": "4a2716f9-06fe-4d3b-aca9-30587ca0a3dd", + "uuid": "2bd23960-1775-4a17-9c68-c8f46d4c009c", "control-id": "pcidss_4_7-3.1", "description": "The description for control-id pcidss_4_7-3.1.", "props": [ @@ -5747,7 +5730,7 @@ ] }, { - "uuid": "deac304e-1629-42ad-a5ad-e7d2b1c5f9b0", + "uuid": "9f85dbe8-86b2-46c4-beda-196f996d6a42", "control-id": "pcidss_4_7-3.2", "description": "The description for control-id pcidss_4_7-3.2.", "props": [ @@ -5760,7 +5743,7 @@ ] }, { - "uuid": "ad240a48-61a0-43d2-b838-6ff22d3295f4", + "uuid": "60f077ca-e378-475a-aa57-b444fb0ad041", "control-id": "pcidss_4_7-3.3", "description": "The description for control-id pcidss_4_7-3.3.", "props": [ @@ -5773,7 +5756,7 @@ ] }, { - "uuid": "4c0e02a9-3388-46c5-8cdc-2a4e76fc176f", + "uuid": "58f85a10-fc2a-4e5a-9bd3-271ba533ed91", "control-id": "pcidss_4_8-1.1", "description": "The description for control-id pcidss_4_8-1.1.", "props": [ @@ -5786,7 +5769,7 @@ ] }, { - "uuid": "ac8a0fd3-e5f4-4fd7-89fb-b36988041196", + "uuid": "61f3dd46-c812-4978-8d14-4cd4a2014da7", "control-id": "pcidss_4_8-1.2", "description": "The description for control-id pcidss_4_8-1.2.", "props": [ @@ -5799,7 +5782,7 @@ ] }, { - "uuid": "dc2655f2-2600-42e0-afcc-9c840aec57d2", + "uuid": "5b0cd1a8-b2a1-4dc2-8cd9-16bd059a41c7", "control-id": "pcidss_4_8-2.1", "description": "The description for control-id pcidss_4_8-2.1.", "props": [ @@ -5842,7 +5825,7 @@ ] }, { - "uuid": "1ff2331e-2e4c-4299-9533-00862185d49d", + "uuid": "5fbcb6d0-d4b7-4964-a7df-afb036883b82", "control-id": "pcidss_4_8-2.2", "description": "This requirement is complemented by 8.2.1 and related to 8.3.5.", "props": [ @@ -5869,7 +5852,7 @@ ] }, { - "uuid": "f5889f0d-fd66-4476-b2a8-75bd8c6b6de3", + "uuid": "c112cded-3684-4823-b806-29c80938f66e", "control-id": "pcidss_4_8-2.3", "description": "The description for control-id pcidss_4_8-2.3.", "props": [ @@ -5882,7 +5865,7 @@ ] }, { - "uuid": "97e72e44-666f-4ade-9381-499e4edfec99", + "uuid": "2e920cb2-0009-4f0b-9247-769e1d8e7e75", "control-id": "pcidss_4_8-2.4", "description": "The description for control-id pcidss_4_8-2.4.", "props": [ @@ -5895,7 +5878,7 @@ ] }, { - "uuid": "a246f6a3-fd75-4095-a20b-1925d3b0a88c", + "uuid": "5d072feb-2882-46cc-8558-adb3e442ccb7", "control-id": "pcidss_4_8-2.5", "description": "The description for control-id pcidss_4_8-2.5.", "props": [ @@ -5908,7 +5891,7 @@ ] }, { - "uuid": "b9d45bad-a273-4f8e-9085-3e30a2f9ac87", + "uuid": "66023730-60a9-42ad-8c11-4682d1dd42ef", "control-id": "pcidss_4_8-2.6", "description": "Also related to requirements 2.2.2 and 8.3.5.", "props": [ @@ -5930,7 +5913,7 @@ ] }, { - "uuid": "c3860dc7-b4ca-4415-9402-e3980687a910", + "uuid": "e445c49e-5bca-45a9-8f13-e48dc6c86006", "control-id": "pcidss_4_8-2.7", "description": "The description for control-id pcidss_4_8-2.7.", "props": [ @@ -5943,7 +5926,7 @@ ] }, { - "uuid": "471899d7-dc05-4e71-9810-762ae40089ec", + "uuid": "33d5ddd7-8fe5-4485-9a1f-0dc34ff921c2", "control-id": "pcidss_4_8-2.8", "description": "No notes for control-id 8.2.8.", "props": [ @@ -6000,7 +5983,7 @@ ] }, { - "uuid": "60c3f81a-5860-4323-97c7-f00e2a8752e0", + "uuid": "cb0187c9-f09a-4705-9d2c-b5dc12d9bb04", "control-id": "pcidss_4_8-3.1", "description": "No notes for control-id 8.3.1.", "props": [ @@ -6032,7 +6015,7 @@ ] }, { - "uuid": "042624e1-841d-4334-a08d-f951f99c5e46", + "uuid": "ebb1b40b-5d6b-4340-bca9-ded14195278e", "control-id": "pcidss_4_8-3.2", "description": "There are similar rules that might be redundant for some distros.", "props": [ @@ -6064,7 +6047,7 @@ ] }, { - "uuid": "166b2d85-e15a-4c95-8cce-38f1381ff14a", + "uuid": "ee35fe97-197e-4d42-a8f1-950355e8d15e", "control-id": "pcidss_4_8-3.3", "description": "The description for control-id pcidss_4_8-3.3.", "props": [ @@ -6077,7 +6060,7 @@ ] }, { - "uuid": "f6d7aea1-1379-4fc4-959c-eb1d3b40af72", + "uuid": "25d29bc3-a87d-4974-9a13-91096a4d61f7", "control-id": "pcidss_4_8-3.4", "description": "No notes for control-id 8.3.4.", "props": [ @@ -6099,7 +6082,7 @@ ] }, { - "uuid": "ebf2701d-cbbd-4231-b151-589626f37299", + "uuid": "10862f22-c600-4bfc-b4b5-658383f0cf93", "control-id": "pcidss_4_8-3.5", "description": "Also related to requirement 2.2.2, 8.2.2 and 8.2.6.", "props": [ @@ -6116,7 +6099,7 @@ ] }, { - "uuid": "ae220150-01c1-4d1e-9de0-5dbac112b516", + "uuid": "cf0e962d-deef-4f64-a4c6-76a3f884dbe8", "control-id": "pcidss_4_8-3.6", "description": "This requirement is not intended to apply to:\n- User accounts on point-of-sale terminals that have access to only one card number at a\ntime to facilitate a single transaction (such as IDs used by cashiers on point-of-sale\nterminals).\n- Application or system accounts, which are governed by requirements in section 8.6.", "props": [ @@ -6143,7 +6126,7 @@ ] }, { - "uuid": "6ae40633-d574-4af9-a8be-c5d5cbff2801", + "uuid": "7818e0dd-d8e0-49e2-8279-60e116ab934a", "control-id": "pcidss_4_8-3.7", "description": "This requirement is not intended to apply to user accounts on point-of-sale terminals that\nhave access to only one card number at a time to facilitate a single transaction (such as\nIDs used by cashiers on point-of-sale terminals).\nFor RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be\nprefered in detriment of accounts_password_pam_unix_remember. Using both should not create\nconflict but is unnecessary and the last should be filtered out from the profile.", "props": [ @@ -6170,7 +6153,7 @@ ] }, { - "uuid": "95e8be20-d921-462f-a7c2-dae2d9e04635", + "uuid": "1b593f42-cde6-43c7-9fdf-89f5afa08a47", "control-id": "pcidss_4_8-3.8", "description": "The description for control-id pcidss_4_8-3.8.", "props": [ @@ -6183,7 +6166,7 @@ ] }, { - "uuid": "9d5c25a3-e1ad-4cfd-b3d0-e67f86b92251", + "uuid": "ac7696fd-27c6-47ba-b35f-4c953f7f935f", "control-id": "pcidss_4_8-3.9", "description": "The requirement does not explicitily define the number of days before the password\nexpiration to warn the users, but the relevant rules were selected here as they do not\ncause any problems in combination with password lifetime rules.", "props": [ @@ -6215,7 +6198,7 @@ ] }, { - "uuid": "6eb6a237-b572-4070-bafe-09162c96401b", + "uuid": "c0c253df-3a25-4db2-a373-22c67155b420", "control-id": "pcidss_4_8-3.10.1", "description": "This requirement is already covered by 8.3.9.", "props": [ @@ -6227,7 +6210,7 @@ ] }, { - "uuid": "be6cbd5c-6c16-4e3a-b560-c4a880a2846c", + "uuid": "1a3117ec-c8c8-4402-a0e7-daa8db957fb3", "control-id": "pcidss_4_8-3.11", "description": "The description for control-id pcidss_4_8-3.11.", "props": [ @@ -6240,7 +6223,7 @@ ] }, { - "uuid": "eeaeb8b3-b6e6-4beb-a719-63270bab66ad", + "uuid": "34470aeb-d507-451d-a6d9-7abba3028b11", "control-id": "pcidss_4_8-4.1", "description": "No notes for control-id 8.4.1.", "props": [ @@ -6252,7 +6235,7 @@ ] }, { - "uuid": "942fcdf1-1e20-4f9d-987e-7d785e55839c", + "uuid": "bcb6a332-7f65-4efd-9bd1-2f07e450244b", "control-id": "pcidss_4_8-4.2", "description": "The description for control-id pcidss_4_8-4.2.", "props": [ @@ -6265,7 +6248,7 @@ ] }, { - "uuid": "4ea36027-9d7c-4594-853a-5c2a94e69340", + "uuid": "3c7ddb72-614c-4e5b-90a8-67b322ed3699", "control-id": "pcidss_4_8-4.3", "description": "The description for control-id pcidss_4_8-4.3.", "props": [ @@ -6278,7 +6261,7 @@ ] }, { - "uuid": "179d4c5f-e00f-4828-937c-3fe5182da7ae", + "uuid": "ac326c44-b3d4-41c0-96d3-e99caaf58ef8", "control-id": "pcidss_4_8-5.1", "description": "The description for control-id pcidss_4_8-5.1.", "props": [ @@ -6291,7 +6274,7 @@ ] }, { - "uuid": "6786a388-800b-4f33-b6a7-77901dc36515", + "uuid": "e840cbec-21f3-465e-ab10-71dccb6dde4b", "control-id": "pcidss_4_8-6.1", "description": "This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system\naccounts usage is restricted. Exceptions to system accounts should be manually checked to\nensure the requirements in description. This requirement although implements some extra\ncontrols regarding root account.", "props": [ @@ -6318,7 +6301,7 @@ ] }, { - "uuid": "7a8888bd-fdfb-4f7a-9238-42d1be38348d", + "uuid": "bc864a40-829d-4fd8-8829-df111d0cce22", "control-id": "pcidss_4_8-6.2", "description": "The description for control-id pcidss_4_8-6.2.", "props": [ @@ -6331,7 +6314,7 @@ ] }, { - "uuid": "6dd8a0b4-756e-4f69-b5a7-5e0a5706bc73", + "uuid": "66ff25e1-d87b-40c6-8dba-1964de223f57", "control-id": "pcidss_4_8-6.3", "description": "Related to requirements 8.3.6 and 8.3.9.", "props": [ @@ -6343,7 +6326,7 @@ ] }, { - "uuid": "cb1e4077-b44e-4287-8d17-859d3d157155", + "uuid": "ee3d19bd-1f1c-48b9-bf37-f90a97348879", "control-id": "pcidss_4_9-1.1", "description": "The description for control-id pcidss_4_9-1.1.", "props": [ @@ -6356,7 +6339,7 @@ ] }, { - "uuid": "15b90706-f0e6-42ed-9a0e-908b5cbbd14d", + "uuid": "55b57e11-690c-48b9-b352-ba02a6f9015a", "control-id": "pcidss_4_9-1.2", "description": "The description for control-id pcidss_4_9-1.2.", "props": [ @@ -6369,7 +6352,7 @@ ] }, { - "uuid": "60ce9d3b-6bd3-4b20-9ce4-b630dcb2cff7", + "uuid": "fbc98b40-7540-4e47-a7fe-2b80baedd811", "control-id": "pcidss_4_9-2.1.1", "description": "The description for control-id pcidss_4_9-2.1.1.", "props": [ @@ -6382,7 +6365,7 @@ ] }, { - "uuid": "80c23ccb-007b-4517-a22e-47b4b6fcdc0c", + "uuid": "5a6a74ae-0897-4fd5-b6b0-1385f53cc1a3", "control-id": "pcidss_4_9-2.2", "description": "The description for control-id pcidss_4_9-2.2.", "props": [ @@ -6395,7 +6378,7 @@ ] }, { - "uuid": "b86eddaf-9823-4cde-8568-7513e5e64a94", + "uuid": "45274af9-aab9-4a7e-a341-5754e37f618e", "control-id": "pcidss_4_9-2.3", "description": "The description for control-id pcidss_4_9-2.3.", "props": [ @@ -6408,7 +6391,7 @@ ] }, { - "uuid": "ae7826a2-9cdf-4990-86bf-a6be18c7e1f1", + "uuid": "7b2e9a4c-c912-4013-99b9-b8953e42e768", "control-id": "pcidss_4_9-2.4", "description": "The description for control-id pcidss_4_9-2.4.", "props": [ @@ -6421,7 +6404,7 @@ ] }, { - "uuid": "fdabb1f2-b7ae-4148-b640-15601f1bd655", + "uuid": "ee1bf588-8275-440c-9bcf-795c81b61c91", "control-id": "pcidss_4_9-3.1.1", "description": "The description for control-id pcidss_4_9-3.1.1.", "props": [ @@ -6434,7 +6417,7 @@ ] }, { - "uuid": "3625abef-a471-44e3-8596-2df75c8b238b", + "uuid": "6869ca25-b50b-4341-b229-b914a822cf3f", "control-id": "pcidss_4_9-3.2", "description": "The description for control-id pcidss_4_9-3.2.", "props": [ @@ -6447,7 +6430,7 @@ ] }, { - "uuid": "8048a65b-9a67-412c-a911-7bbfa83a7b07", + "uuid": "452aef07-56af-4d1f-8c0f-4d92945a02ad", "control-id": "pcidss_4_9-3.3", "description": "The description for control-id pcidss_4_9-3.3.", "props": [ @@ -6460,7 +6443,7 @@ ] }, { - "uuid": "f17ee621-6664-4d59-ba7a-1e70b4111af4", + "uuid": "b4d4fc2c-2ead-4d9d-954a-167e860a596f", "control-id": "pcidss_4_9-3.4", "description": "The description for control-id pcidss_4_9-3.4.", "props": [ @@ -6473,7 +6456,7 @@ ] }, { - "uuid": "5b40c4fa-adee-4450-8774-ba495dde9ff1", + "uuid": "413af2b4-76ed-4a1a-851d-9f4f4f745651", "control-id": "pcidss_4_9-4.1.1", "description": "The description for control-id pcidss_4_9-4.1.1.", "props": [ @@ -6486,7 +6469,7 @@ ] }, { - "uuid": "bedaa0a9-5e47-4244-b9d8-c1ba47e29eda", + "uuid": "2a0586f7-4dd0-4493-b8fb-c39e55e5e7d8", "control-id": "pcidss_4_9-4.1.2", "description": "The description for control-id pcidss_4_9-4.1.2.", "props": [ @@ -6499,7 +6482,7 @@ ] }, { - "uuid": "4592839a-e52e-49d7-b697-b33015249a8b", + "uuid": "8ddb0469-c6d5-4a97-aa82-41eef5716822", "control-id": "pcidss_4_9-4.2", "description": "The description for control-id pcidss_4_9-4.2.", "props": [ @@ -6512,7 +6495,7 @@ ] }, { - "uuid": "6e5a3186-b185-45e0-9abf-f9645f291b8e", + "uuid": "72eea582-77a3-4e8d-bf34-c11f014d7d87", "control-id": "pcidss_4_9-4.3", "description": "The description for control-id pcidss_4_9-4.3.", "props": [ @@ -6525,7 +6508,7 @@ ] }, { - "uuid": "96a6800a-4c34-4814-b000-c673e2fb2120", + "uuid": "46156b29-8d8a-4048-9c36-1253b41e050e", "control-id": "pcidss_4_9-4.4", "description": "The description for control-id pcidss_4_9-4.4.", "props": [ @@ -6538,7 +6521,7 @@ ] }, { - "uuid": "c7ff4099-2dea-4060-8539-dab4770580c6", + "uuid": "9dd2c5f2-b8ba-4f95-ac53-6f7c4f53d327", "control-id": "pcidss_4_9-4.5.1", "description": "The description for control-id pcidss_4_9-4.5.1.", "props": [ @@ -6551,7 +6534,7 @@ ] }, { - "uuid": "a1e30cb0-4d58-4d0a-b5cc-d17108dae1e5", + "uuid": "6719e3c3-0d24-45e0-aae2-286c73389a85", "control-id": "pcidss_4_9-4.6", "description": "The description for control-id pcidss_4_9-4.6.", "props": [ @@ -6564,7 +6547,7 @@ ] }, { - "uuid": "0b85bc15-4325-4939-bdda-2a034b1c5e84", + "uuid": "a9592502-8ac8-4dce-becd-957f9baefbc8", "control-id": "pcidss_4_9-4.7", "description": "The description for control-id pcidss_4_9-4.7.", "props": [ @@ -6577,7 +6560,7 @@ ] }, { - "uuid": "63874669-9abf-4a79-8652-853bf72d0add", + "uuid": "06a77b16-e242-4e92-804a-76560631d22f", "control-id": "pcidss_4_9-5.1.1", "description": "The description for control-id pcidss_4_9-5.1.1.", "props": [ @@ -6590,7 +6573,7 @@ ] }, { - "uuid": "05a4c201-d608-4627-9e28-64375dfcad49", + "uuid": "db055dc4-547e-4dd6-a61a-3120618c0729", "control-id": "pcidss_4_9-5.1.2.1", "description": "The description for control-id pcidss_4_9-5.1.2.1.", "props": [ @@ -6603,7 +6586,7 @@ ] }, { - "uuid": "c7d09232-b56d-4737-9beb-d149098b6dfb", + "uuid": "76c95964-7ace-4ad8-b956-3b63522abfa6", "control-id": "pcidss_4_9-5.1.3", "description": "The description for control-id pcidss_4_9-5.1.3.", "props": [ @@ -6616,7 +6599,7 @@ ] }, { - "uuid": "d3918303-49b6-4907-92f4-3a6b0689cada", + "uuid": "bb8d24ee-8c82-4e33-b7c4-3a120e8a8a44", "control-id": "pcidss_4_10-1.1", "description": "The description for control-id pcidss_4_10-1.1.", "props": [ @@ -6629,7 +6612,7 @@ ] }, { - "uuid": "ba571d63-110c-46d9-919b-a9d568702aa7", + "uuid": "5a2c66bb-48d0-4553-954b-2d14d9d8fe74", "control-id": "pcidss_4_10-1.2", "description": "The description for control-id pcidss_4_10-1.2.", "props": [ @@ -6642,7 +6625,7 @@ ] }, { - "uuid": "2d5c5227-8ce1-4ea8-82f1-724680f127b2", + "uuid": "3e8bde4c-fd50-4b16-95fe-6fd7bf9c22be", "control-id": "pcidss_4_10-2.1.1", "description": "The description for control-id pcidss_4_10-2.1.1.", "props": [ @@ -6655,7 +6638,7 @@ ] }, { - "uuid": "df04ad10-4600-4394-ba46-e02406df1e10", + "uuid": "c6a816d1-c53d-4b8d-a95a-2df74a0584d3", "control-id": "pcidss_4_10-2.1.2", "description": "Not all privileged commands have suid or sgid enabled. We probably want to include more\nrules for this requirement.", "props": [ @@ -6672,7 +6655,7 @@ ] }, { - "uuid": "a43f75e4-a4c3-4f38-90ff-157b5162a67b", + "uuid": "4fef2996-965f-4b2b-89f9-223b011653e9", "control-id": "pcidss_4_10-2.1.3", "description": "No notes for control-id 10.2.1.3.", "props": [ @@ -6719,7 +6702,7 @@ ] }, { - "uuid": "06471539-0a11-4418-9eec-0e1eb1915e43", + "uuid": "ac24f0a1-d792-4026-aebf-2ccc8b293d0e", "control-id": "pcidss_4_10-2.1.4", "description": "No notes for control-id 10.2.1.4.", "props": [ @@ -6736,7 +6719,7 @@ ] }, { - "uuid": "4acdc8c3-f4f8-4c8c-9e6a-901a12fe33a0", + "uuid": "bf6522b1-c375-4fc6-8487-549058530d72", "control-id": "pcidss_4_10-2.1.5", "description": "No notes for control-id 10.2.1.5.", "props": [ @@ -6778,7 +6761,7 @@ ] }, { - "uuid": "1e9b83ad-4272-43ed-a75d-f0d0cbda63d7", + "uuid": "8b721670-7da3-4531-9c9f-c7341933edc2", "control-id": "pcidss_4_10-2.1.6", "description": "The description for control-id pcidss_4_10-2.1.6.", "props": [ @@ -6791,7 +6774,7 @@ ] }, { - "uuid": "6ff7e28a-149f-4bcf-83d0-85f49ec71b68", + "uuid": "0038f551-8f50-49e4-bd4c-1945d26adb0c", "control-id": "pcidss_4_10-2.1.7", "description": "There are enough rules to capture deletion events but not for creation events.\nThis requirement needs to be better investigated to confirm which additional rules would\nsatistfy the requirement.", "props": [ @@ -6838,7 +6821,7 @@ ] }, { - "uuid": "ebdf442d-4115-4693-9d01-b9e2bdc88829", + "uuid": "b9bcf297-1079-4b9b-be76-c14048beabb6", "control-id": "pcidss_4_10-2.2", "description": "Standard settings for audit should be enough.", "props": [ @@ -6855,7 +6838,7 @@ ] }, { - "uuid": "3e7fd906-31ef-4c7f-adda-7ec2fea332e8", + "uuid": "4d78ddd7-69b1-4841-b123-413995e31eca", "control-id": "pcidss_4_10-3.1", "description": "No notes for control-id 10.3.1.", "props": [ @@ -6882,7 +6865,7 @@ ] }, { - "uuid": "6028b4b6-79e7-4410-8512-d53457d03e30", + "uuid": "bfb2795c-54db-4f17-973a-e3f8610173b9", "control-id": "pcidss_4_10-3.2", "description": "No notes for control-id 10.3.2.", "props": [ @@ -6919,7 +6902,7 @@ ] }, { - "uuid": "a6820a2c-ad17-4e69-a886-14585a94a5d0", + "uuid": "20e961db-357f-4196-a9d0-fa7c02a3f6ca", "control-id": "pcidss_4_10-3.3", "description": "Although the technologies in general allow to send logs to a centralized server, some\nparameters for this configuration are specific to each site policy and therefore the\nrequirement demands manual assessment.", "props": [ @@ -6941,7 +6924,7 @@ ] }, { - "uuid": "d376c578-a5a7-48db-b801-3cf4a7c41e3e", + "uuid": "c3b73b4c-244c-4b33-90cf-6d46e91b8eec", "control-id": "pcidss_4_10-3.4", "description": "No notes for control-id 10.3.4.", "props": [ @@ -7033,7 +7016,7 @@ ] }, { - "uuid": "d371802c-a5d8-4ba4-9123-ad4430d7b443", + "uuid": "d1be12cc-551c-4e6c-ac98-3fd682ce378c", "control-id": "pcidss_4_10-4.1.1", "description": "The description for control-id pcidss_4_10-4.1.1.", "props": [ @@ -7046,7 +7029,7 @@ ] }, { - "uuid": "7618db41-d5aa-44bb-a6c2-67a1430a4149", + "uuid": "7bb87785-137f-4092-af17-e43aaea65448", "control-id": "pcidss_4_10-4.2.1", "description": "The description for control-id pcidss_4_10-4.2.1.", "props": [ @@ -7059,7 +7042,7 @@ ] }, { - "uuid": "b572908d-0840-4457-b581-2bda3dd0fe06", + "uuid": "adf56ca3-fc5c-4894-b50b-a221bedde32c", "control-id": "pcidss_4_10-4.3", "description": "The description for control-id pcidss_4_10-4.3.", "props": [ @@ -7072,7 +7055,7 @@ ] }, { - "uuid": "52fe9855-fb9a-4008-a89c-3d0697714b5a", + "uuid": "05b1c7b2-2a33-4b26-9fd2-77298d804e4c", "control-id": "pcidss_4_10-5.1", "description": "It is not simple to ensure 12 months history is present in each system but the rules in\nthis requirement ensures the logs are not lost without administrators awareness.", "props": [ @@ -7109,7 +7092,7 @@ ] }, { - "uuid": "ed976b21-0155-464d-ac6e-0c2efd7cca50", + "uuid": "503ded41-6261-493a-abde-bd22d577d4a3", "control-id": "pcidss_4_10-6.1", "description": "Maybe it is possible to optmize some similar rules related to ntp.", "props": [ @@ -7126,7 +7109,7 @@ ] }, { - "uuid": "484ff03c-16c4-4481-a6b7-779f36da23b2", + "uuid": "bfb96c20-b543-41c8-b0d4-47ea281cda74", "control-id": "pcidss_4_10-6.2", "description": "The selected rules might need updates in order to restrict their platform applicability\nto avoid conflicts.", "props": [ @@ -7143,7 +7126,7 @@ ] }, { - "uuid": "253ef780-0ef7-4cf9-aec8-b501472c932b", + "uuid": "8c12b7bd-7c27-4efa-b2df-87cd866065ab", "control-id": "pcidss_4_10-6.3", "description": "No notes for control-id 10.6.3.", "props": [ @@ -7185,7 +7168,7 @@ ] }, { - "uuid": "747e89d3-676a-42a0-9aea-884ba11cd3d3", + "uuid": "7d926d16-9630-4961-9849-ce1bec00c04d", "control-id": "pcidss_4_10-7.1", "description": "The description for control-id pcidss_4_10-7.1.", "props": [ @@ -7198,7 +7181,7 @@ ] }, { - "uuid": "bbb12c40-2631-4437-a1fc-c3a94b23bfde", + "uuid": "491fa514-6904-4ff9-a572-7f87b883f86c", "control-id": "pcidss_4_10-7.2", "description": "No notes for control-id 10.7.2.", "props": [ @@ -7220,7 +7203,7 @@ ] }, { - "uuid": "9146f256-d7ea-4e8c-983c-1b9c5b9b2c4d", + "uuid": "ab17b169-4562-44cb-bc27-a78ce3784f62", "control-id": "pcidss_4_10-7.3", "description": "The description for control-id pcidss_4_10-7.3.", "props": [ @@ -7233,7 +7216,7 @@ ] }, { - "uuid": "67f302b1-5ec4-4c46-b4f9-e7965d2b0a21", + "uuid": "156e17fd-2cd9-4858-8187-dbab238812b6", "control-id": "pcidss_4_11-1.1", "description": "The description for control-id pcidss_4_11-1.1.", "props": [ @@ -7246,7 +7229,7 @@ ] }, { - "uuid": "487f2b56-97e1-4e48-8e5c-2f026685a2b4", + "uuid": "b0341d23-579a-4ddd-bd48-5848b470d391", "control-id": "pcidss_4_11-1.2", "description": "The description for control-id pcidss_4_11-1.2.", "props": [ @@ -7259,7 +7242,7 @@ ] }, { - "uuid": "d1184540-5777-47ec-8a18-38f4dcaab1e8", + "uuid": "70144701-59ed-4638-8164-9633ecbf8a3c", "control-id": "pcidss_4_11-2.1", "description": "The description for control-id pcidss_4_11-2.1.", "props": [ @@ -7272,7 +7255,7 @@ ] }, { - "uuid": "1b257540-cd3e-4073-b88f-93f90dd1015e", + "uuid": "b04e806c-37a8-41fd-851d-307f73b285af", "control-id": "pcidss_4_11-2.2", "description": "The description for control-id pcidss_4_11-2.2.", "props": [ @@ -7285,7 +7268,7 @@ ] }, { - "uuid": "ae364acb-6f2e-437a-b844-ffe0a6c428b5", + "uuid": "15e0f7e3-be98-4ce9-b80d-4471f2266539", "control-id": "pcidss_4_11-3.1.1", "description": "The description for control-id pcidss_4_11-3.1.1.", "props": [ @@ -7298,7 +7281,7 @@ ] }, { - "uuid": "79fb1da1-aae2-4ca9-82ee-265ef3960eac", + "uuid": "35db6540-929f-40e6-8448-20dbd9af8dfd", "control-id": "pcidss_4_11-3.1.2", "description": "The description for control-id pcidss_4_11-3.1.2.", "props": [ @@ -7311,7 +7294,7 @@ ] }, { - "uuid": "5e0f4a57-c776-4d56-994d-ce9c516d5b0f", + "uuid": "a529f621-2c1f-49ed-bad9-538a0b699492", "control-id": "pcidss_4_11-3.1.3", "description": "The description for control-id pcidss_4_11-3.1.3.", "props": [ @@ -7324,7 +7307,7 @@ ] }, { - "uuid": "018e620b-153f-462b-9e51-9c5103798e10", + "uuid": "7d61e808-5bfc-4346-8cb1-0dfe5370f499", "control-id": "pcidss_4_11-3.2.1", "description": "The description for control-id pcidss_4_11-3.2.1.", "props": [ @@ -7337,7 +7320,7 @@ ] }, { - "uuid": "35afc1d9-a138-4d81-866d-7202be2f17c8", + "uuid": "86ff29ab-497a-4287-90f1-4a7127492f13", "control-id": "pcidss_4_11-4.1", "description": "The description for control-id pcidss_4_11-4.1.", "props": [ @@ -7350,7 +7333,7 @@ ] }, { - "uuid": "b7cfae0c-a283-485b-adb4-b6a20e9aa418", + "uuid": "700e925e-5df2-4716-b790-33f089175443", "control-id": "pcidss_4_11-4.2", "description": "The description for control-id pcidss_4_11-4.2.", "props": [ @@ -7363,7 +7346,7 @@ ] }, { - "uuid": "cd8ea9f9-a928-496f-aa0d-f56b8d86fd5d", + "uuid": "59aa5ac0-a30b-4152-bccd-39504ac8e73d", "control-id": "pcidss_4_11-4.3", "description": "The description for control-id pcidss_4_11-4.3.", "props": [ @@ -7376,7 +7359,7 @@ ] }, { - "uuid": "d418c6fe-de7d-48e9-8d3a-0dd11dbd01f2", + "uuid": "7d6d5a28-ca02-420d-a8be-df3264a3d663", "control-id": "pcidss_4_11-4.4", "description": "The description for control-id pcidss_4_11-4.4.", "props": [ @@ -7389,7 +7372,7 @@ ] }, { - "uuid": "6b89679b-9be9-40b9-9b69-e9561c1521a7", + "uuid": "5e03f6dd-311f-4e48-99af-76ad9ad1e487", "control-id": "pcidss_4_11-4.5", "description": "The description for control-id pcidss_4_11-4.5.", "props": [ @@ -7402,7 +7385,7 @@ ] }, { - "uuid": "4259ce1c-4717-427b-a452-13fac2fd3e3f", + "uuid": "81be247d-dd2f-4c83-9ebf-dc1dbf093d26", "control-id": "pcidss_4_11-4.6", "description": "The description for control-id pcidss_4_11-4.6.", "props": [ @@ -7415,7 +7398,7 @@ ] }, { - "uuid": "436b7281-6d26-4cd1-b72f-ee49c4640050", + "uuid": "2888813e-427f-4f5e-a818-d51863116166", "control-id": "pcidss_4_11-4.7", "description": "The description for control-id pcidss_4_11-4.7.", "props": [ @@ -7428,7 +7411,7 @@ ] }, { - "uuid": "a087cdfc-9ea8-4b17-8364-e37ba8dbdf89", + "uuid": "67d9ebe6-f60d-404f-8875-afdee58cda47", "control-id": "pcidss_4_11-5.1.1", "description": "The description for control-id pcidss_4_11-5.1.1.", "props": [ @@ -7441,7 +7424,7 @@ ] }, { - "uuid": "35974825-c25d-45f6-9bb7-97249c3f4397", + "uuid": "a522deb5-85ff-4a32-a440-7aa3c7bb333c", "control-id": "pcidss_4_11-5.2", "description": "No notes for control-id 11.5.2.", "props": [ @@ -7478,7 +7461,7 @@ ] }, { - "uuid": "d7909aa6-3c0d-443c-8b2b-6b5af598028c", + "uuid": "80b46452-ad1c-4808-a5f9-0a8b9907ff50", "control-id": "pcidss_4_11-6.1", "description": "The description for control-id pcidss_4_11-6.1.", "props": [ @@ -7491,7 +7474,7 @@ ] }, { - "uuid": "6d3dfc34-0fba-40f6-88ca-f01f54c1f881", + "uuid": "326a03e8-4bdb-46be-9b66-99a482641efc", "control-id": "pcidss_4_12-1.1", "description": "The description for control-id pcidss_4_12-1.1.", "props": [ @@ -7504,7 +7487,7 @@ ] }, { - "uuid": "116f319a-1821-4d10-8a26-3379fdc0a371", + "uuid": "fff2790c-f0fe-4e9c-b2ee-4a153b09edaa", "control-id": "pcidss_4_12-1.2", "description": "The description for control-id pcidss_4_12-1.2.", "props": [ @@ -7517,7 +7500,7 @@ ] }, { - "uuid": "7ef4224c-4299-42eb-a6cf-bcf7f1cc11e5", + "uuid": "ce9f8121-4b48-4e44-b871-2b5948484395", "control-id": "pcidss_4_12-1.3", "description": "The description for control-id pcidss_4_12-1.3.", "props": [ @@ -7530,7 +7513,7 @@ ] }, { - "uuid": "fe23027d-4153-402e-8499-c3dfd7969d90", + "uuid": "a79315bf-d227-4556-8183-3943df0f28a6", "control-id": "pcidss_4_12-1.4", "description": "The description for control-id pcidss_4_12-1.4.", "props": [ @@ -7543,7 +7526,7 @@ ] }, { - "uuid": "a7340de8-6841-4c34-9dfc-ea5bdf75c6f0", + "uuid": "197f7e1e-5670-4574-adc8-35ff755de885", "control-id": "pcidss_4_12-2.1", "description": "The description for control-id pcidss_4_12-2.1.", "props": [ @@ -7556,7 +7539,7 @@ ] }, { - "uuid": "fe97e021-4686-475a-a9a1-7bf186899dbd", + "uuid": "ebd0d606-fc62-4e85-86dd-5c28382ed2c2", "control-id": "pcidss_4_12-3.1", "description": "The description for control-id pcidss_4_12-3.1.", "props": [ @@ -7569,7 +7552,7 @@ ] }, { - "uuid": "e4c67219-945d-49c0-bd45-4b962785e83f", + "uuid": "5a8cea78-8eb0-47da-9995-7ddf020e9ab9", "control-id": "pcidss_4_12-3.2", "description": "The description for control-id pcidss_4_12-3.2.", "props": [ @@ -7582,7 +7565,7 @@ ] }, { - "uuid": "75f8cec1-4b42-4832-a58d-caad2a9ccaa9", + "uuid": "3de0e859-be0d-426a-9aa8-15cef5abf093", "control-id": "pcidss_4_12-3.3", "description": "The description for control-id pcidss_4_12-3.3.", "props": [ @@ -7595,7 +7578,7 @@ ] }, { - "uuid": "2ba357b0-ea09-40ce-be06-b145eed475fd", + "uuid": "8ca39c61-a581-4990-bd6b-0aae595f7023", "control-id": "pcidss_4_12-3.4", "description": "The description for control-id pcidss_4_12-3.4.", "props": [ @@ -7608,7 +7591,7 @@ ] }, { - "uuid": "a43305c8-a9f6-4d9c-9f0a-6ec4779f8a5e", + "uuid": "4b6a6276-1401-40d8-ab56-a0ed594e5080", "control-id": "pcidss_4_12-4.1", "description": "The description for control-id pcidss_4_12-4.1.", "props": [ @@ -7621,7 +7604,7 @@ ] }, { - "uuid": "30f1207e-5665-4fc5-862f-1289eda70cb1", + "uuid": "84ad47fd-442f-4f8d-a0fc-50ca39727252", "control-id": "pcidss_4_12-4.2.1", "description": "The description for control-id pcidss_4_12-4.2.1.", "props": [ @@ -7634,7 +7617,7 @@ ] }, { - "uuid": "09f67b49-5cf9-4320-900d-cf051a02f241", + "uuid": "36eb4bd7-2295-4eab-9337-5b69ed6ac4aa", "control-id": "pcidss_4_12-5.1", "description": "The description for control-id pcidss_4_12-5.1.", "props": [ @@ -7647,7 +7630,7 @@ ] }, { - "uuid": "9d77f314-50ff-4925-a6c6-a9b96e761889", + "uuid": "2d7ac14b-d679-4cd8-9530-9632dbe95c16", "control-id": "pcidss_4_12-5.2.1", "description": "The description for control-id pcidss_4_12-5.2.1.", "props": [ @@ -7660,7 +7643,7 @@ ] }, { - "uuid": "1ae2b68f-3561-4563-9cfd-12a2a0dda8d8", + "uuid": "fbc9fae9-0a1a-4b55-a68e-511a12e97594", "control-id": "pcidss_4_12-5.3", "description": "The description for control-id pcidss_4_12-5.3.", "props": [ @@ -7673,7 +7656,7 @@ ] }, { - "uuid": "acaa7e67-b5a1-458b-8787-5757b3704575", + "uuid": "39f9df9e-bbb7-451e-bf28-aeb68e3dc7a4", "control-id": "pcidss_4_12-6.1", "description": "The description for control-id pcidss_4_12-6.1.", "props": [ @@ -7686,7 +7669,7 @@ ] }, { - "uuid": "4c731b93-7517-4e3b-a85f-8494004bd587", + "uuid": "f93c88c3-d84c-4e8a-8c56-da316f0ee522", "control-id": "pcidss_4_12-6.2", "description": "The description for control-id pcidss_4_12-6.2.", "props": [ @@ -7699,7 +7682,7 @@ ] }, { - "uuid": "08160de4-af23-4f54-98ec-653736a7810c", + "uuid": "b22a5d6e-2435-4016-a24b-46023c7a5f1b", "control-id": "pcidss_4_12-6.3.1", "description": "The description for control-id pcidss_4_12-6.3.1.", "props": [ @@ -7712,7 +7695,7 @@ ] }, { - "uuid": "ce2ea606-f35e-4409-a40a-411a8058005a", + "uuid": "5f9a7729-ac83-4683-8419-a5d4607365bd", "control-id": "pcidss_4_12-6.3.2", "description": "The description for control-id pcidss_4_12-6.3.2.", "props": [ @@ -7725,7 +7708,7 @@ ] }, { - "uuid": "97f2d70e-f552-43ef-9ba0-148da26d05f2", + "uuid": "f68f9c03-0b3a-4fc8-88fa-064b77f37ba4", "control-id": "pcidss_4_12-7.1", "description": "The description for control-id pcidss_4_12-7.1.", "props": [ @@ -7738,7 +7721,7 @@ ] }, { - "uuid": "23d37200-df9c-46b6-9d50-f218e902256b", + "uuid": "033f5c2c-ec9b-4e42-b7a8-bdc62849fa1f", "control-id": "pcidss_4_12-8.1", "description": "The description for control-id pcidss_4_12-8.1.", "props": [ @@ -7751,7 +7734,7 @@ ] }, { - "uuid": "a83e6536-3f65-4273-8bec-6c45e3a65bab", + "uuid": "d32ed488-db9f-4687-9d75-e93904df8e20", "control-id": "pcidss_4_12-8.2", "description": "The description for control-id pcidss_4_12-8.2.", "props": [ @@ -7764,7 +7747,7 @@ ] }, { - "uuid": "167e9e03-0221-4cb1-9a4a-0a784b0ab9ce", + "uuid": "60692c0c-ae72-4eb7-afb3-e93e3efa6271", "control-id": "pcidss_4_12-8.3", "description": "The description for control-id pcidss_4_12-8.3.", "props": [ @@ -7777,7 +7760,7 @@ ] }, { - "uuid": "37a3f10e-3de2-493e-9c7c-761c88b062d7", + "uuid": "90bcd500-88c6-4eae-8393-3ff73b875718", "control-id": "pcidss_4_12-8.4", "description": "The description for control-id pcidss_4_12-8.4.", "props": [ @@ -7790,7 +7773,7 @@ ] }, { - "uuid": "8e52c143-6fb1-49d7-b4c4-cd3cff071018", + "uuid": "310dcea2-677a-4338-a921-f0a39f4f82e0", "control-id": "pcidss_4_12-8.5", "description": "The description for control-id pcidss_4_12-8.5.", "props": [ @@ -7803,7 +7786,7 @@ ] }, { - "uuid": "8a6955a6-0b1c-41bf-9f55-66ceb9ac82c5", + "uuid": "e3f48876-c6da-42a1-a3f6-116bbc579147", "control-id": "pcidss_4_12-9.1", "description": "The description for control-id pcidss_4_12-9.1.", "props": [ @@ -7816,7 +7799,7 @@ ] }, { - "uuid": "7cd24204-6694-40c2-9b46-938dfb4cc4d4", + "uuid": "830c43c6-81fc-4665-8d46-9656798bf0ce", "control-id": "pcidss_4_12-9.2", "description": "The description for control-id pcidss_4_12-9.2.", "props": [ @@ -7829,7 +7812,7 @@ ] }, { - "uuid": "9bfc3acf-abf4-4ffc-b0e4-a3e469fbd218", + "uuid": "f55fede7-9305-466a-9872-3547d0297ad9", "control-id": "pcidss_4_12-10.1", "description": "The description for control-id pcidss_4_12-10.1.", "props": [ @@ -7842,7 +7825,7 @@ ] }, { - "uuid": "d14d8ab7-2f59-4206-9f13-76305518e45d", + "uuid": "93355c15-623a-4bbf-80bc-8f660767cee7", "control-id": "pcidss_4_12-10.2", "description": "The description for control-id pcidss_4_12-10.2.", "props": [ @@ -7855,7 +7838,7 @@ ] }, { - "uuid": "b1e7abc7-588f-41f7-9240-5a575fa73265", + "uuid": "75a02d78-0051-46da-a18d-71cb2a484d70", "control-id": "pcidss_4_12-10.3", "description": "The description for control-id pcidss_4_12-10.3.", "props": [ @@ -7868,7 +7851,7 @@ ] }, { - "uuid": "dbade05d-3712-4d08-9bd6-e1b4e20c7508", + "uuid": "95a96c9a-7e90-4eba-a89c-933907e5f6f1", "control-id": "pcidss_4_12-10.4.1", "description": "The description for control-id pcidss_4_12-10.4.1.", "props": [ @@ -7881,7 +7864,7 @@ ] }, { - "uuid": "cd5472b2-62f0-4bc5-b186-7003f0a07513", + "uuid": "b62e809c-54e5-4d74-bb6c-46cadfcd1ab0", "control-id": "pcidss_4_12-10.5", "description": "The description for control-id pcidss_4_12-10.5.", "props": [ @@ -7894,7 +7877,7 @@ ] }, { - "uuid": "a6a53c82-893a-4597-b4f4-6092fe462a3e", + "uuid": "8d142477-a870-461a-b53c-bbefa1dfd8c5", "control-id": "pcidss_4_12-10.6", "description": "The description for control-id pcidss_4_12-10.6.", "props": [ @@ -7907,7 +7890,7 @@ ] }, { - "uuid": "355421f0-1ece-4c9e-833d-83ef304b319c", + "uuid": "76440927-7fde-4bbb-ac48-714bd8aedd18", "control-id": "pcidss_4_12-10.7", "description": "The description for control-id pcidss_4_12-10.7.", "props": [ @@ -7920,7 +7903,7 @@ ] }, { - "uuid": "21eccbe1-f9fd-46d9-a66b-a5faf59a6d3d", + "uuid": "2577fd2f-291f-43dc-8d64-4f4c83b4b0f6", "control-id": "a1-1.1", "description": "The description for control-id a1-1.1.", "props": [ @@ -7933,7 +7916,7 @@ ] }, { - "uuid": "86c2c9fd-1e1a-4f61-bc8f-2ac2ef138c79", + "uuid": "4c4ead67-7cea-4a22-9b01-bc4cac589823", "control-id": "a1-1.2", "description": "The description for control-id a1-1.2.", "props": [ @@ -7946,7 +7929,7 @@ ] }, { - "uuid": "f01620fc-3639-432d-9970-cbb629f37c54", + "uuid": "2d78d3e9-230a-49ad-a76f-00e53b892b69", "control-id": "a1-1.3", "description": "The description for control-id a1-1.3.", "props": [ @@ -7959,7 +7942,7 @@ ] }, { - "uuid": "1549bad1-ab94-488d-bd69-df59cc49d89d", + "uuid": "bda61903-7ed5-4174-9be9-3dda765798e2", "control-id": "a1-1.4", "description": "The description for control-id a1-1.4.", "props": [ @@ -7972,7 +7955,7 @@ ] }, { - "uuid": "c0edec21-72e6-49ff-8640-1cea6f012e84", + "uuid": "1d383aae-888e-4863-a444-fd100bd3c8c5", "control-id": "a1-2.1", "description": "The description for control-id a1-2.1.", "props": [ @@ -7985,7 +7968,7 @@ ] }, { - "uuid": "e5eb7411-5836-4551-843f-354b6072ce2e", + "uuid": "256baa9a-7bbd-4090-984e-4ef5a5f6bb36", "control-id": "a1-2.2", "description": "The description for control-id a1-2.2.", "props": [ @@ -7998,7 +7981,7 @@ ] }, { - "uuid": "fcfd2d38-b8d0-4db6-a675-149bb134a345", + "uuid": "cd3cca9c-0767-429d-82ad-d13e43cba2a5", "control-id": "a1-2.3", "description": "The description for control-id a1-2.3.", "props": [ @@ -8011,7 +7994,7 @@ ] }, { - "uuid": "01f86832-fcef-4c03-aa56-949cb6d4407d", + "uuid": "5e54eeba-39a2-4af8-a4df-dfc60436a930", "control-id": "a2-1.1", "description": "The description for control-id a2-1.1.", "props": [ @@ -8024,7 +8007,7 @@ ] }, { - "uuid": "0139d631-4f60-48ca-9376-a1c6a39880ca", + "uuid": "9702051c-e6d8-42de-8194-2be2ad1d7dc1", "control-id": "a2-1.2", "description": "The description for control-id a2-1.2.", "props": [ @@ -8037,7 +8020,7 @@ ] }, { - "uuid": "eb5ba465-3765-487e-935e-adaf5f7a8c28", + "uuid": "cc06c037-5002-4a5b-89f5-e56f2321a2a3", "control-id": "a2-1.3", "description": "The description for control-id a2-1.3.", "props": [ @@ -8050,7 +8033,7 @@ ] }, { - "uuid": "5a898a1c-7e92-4e7e-b7e6-702666cc98d1", + "uuid": "f3e87c42-62c1-498e-bb39-031cf55edf6d", "control-id": "a3-1.1", "description": "The description for control-id a3-1.1.", "props": [ @@ -8063,7 +8046,7 @@ ] }, { - "uuid": "7d3ee99f-fc92-4752-a011-1a341485cc24", + "uuid": "5158372d-dd80-4155-a239-67c6874eaf54", "control-id": "a3-1.2", "description": "The description for control-id a3-1.2.", "props": [ @@ -8076,7 +8059,7 @@ ] }, { - "uuid": "5c140ff1-76e4-430b-8df5-1314d04d0b43", + "uuid": "42858a58-adec-4f44-90ac-073c92ebf410", "control-id": "a3-1.3", "description": "The description for control-id a3-1.3.", "props": [ @@ -8089,7 +8072,7 @@ ] }, { - "uuid": "745c1660-a31d-4d99-b9cb-fe863cb27982", + "uuid": "9e2895d1-a529-4568-b006-bafff2fd277e", "control-id": "a3-1.4", "description": "The description for control-id a3-1.4.", "props": [ @@ -8102,7 +8085,7 @@ ] }, { - "uuid": "32d18cfd-e3a0-4113-aabc-48126cc68922", + "uuid": "a265e021-b93b-4a75-8ccd-c685f56380a9", "control-id": "a3-2.1", "description": "The description for control-id a3-2.1.", "props": [ @@ -8115,7 +8098,7 @@ ] }, { - "uuid": "895dc630-6159-4485-be7a-39709f6f417d", + "uuid": "2e96545f-94cf-4324-8d60-c9d129383188", "control-id": "a3-2.2.1", "description": "The description for control-id a3-2.2.1.", "props": [ @@ -8128,7 +8111,7 @@ ] }, { - "uuid": "ff0bf3be-6887-4422-b574-6a8d27dbe2e8", + "uuid": "412f10f7-1434-4af4-a593-fbf7a2caacad", "control-id": "a3-2.3", "description": "The description for control-id a3-2.3.", "props": [ @@ -8141,7 +8124,7 @@ ] }, { - "uuid": "e12428fa-ea1b-412e-af61-6a3f68bb9762", + "uuid": "7bcdfef7-3770-4be9-b3a8-87ae82b484e5", "control-id": "a3-2.4", "description": "The description for control-id a3-2.4.", "props": [ @@ -8154,7 +8137,7 @@ ] }, { - "uuid": "e11f6b8a-6faf-4ac8-b68f-6799a0f62804", + "uuid": "db23b56c-cdb9-45e6-b65c-fa55f75a5b1f", "control-id": "a3-2.5.1", "description": "The description for control-id a3-2.5.1.", "props": [ @@ -8167,7 +8150,7 @@ ] }, { - "uuid": "3caab8c1-11c6-4bd6-9225-21c36a179d93", + "uuid": "ad31d454-e8cc-4825-9784-7114686741d4", "control-id": "a3-2.5.2", "description": "The description for control-id a3-2.5.2.", "props": [ @@ -8180,7 +8163,7 @@ ] }, { - "uuid": "28afedb0-5762-4fa6-bfc9-cb3cf0712f1f", + "uuid": "843302e0-4b10-4d39-a356-39009bfa4e74", "control-id": "a3-2.6.1", "description": "The description for control-id a3-2.6.1.", "props": [ @@ -8193,7 +8176,7 @@ ] }, { - "uuid": "beca8bff-2c1f-49d3-a8c8-021945d41db4", + "uuid": "db7b30a2-8d3e-425d-881e-61fb951daa65", "control-id": "a3-3.1.2", "description": "The description for control-id a3-3.1.2.", "props": [ @@ -8206,7 +8189,7 @@ ] }, { - "uuid": "3e8ee70f-4072-48ce-9381-3182c6c0d7c5", + "uuid": "9221d6df-bb1e-4a39-83e4-ba2b2f0d5563", "control-id": "a3-3.2", "description": "The description for control-id a3-3.2.", "props": [ @@ -8219,7 +8202,7 @@ ] }, { - "uuid": "19514a5b-f802-4016-bc2c-d025f8d9105a", + "uuid": "1f32ff93-ca46-4069-bcd9-95b1f7cb136d", "control-id": "a3-3.3", "description": "The description for control-id a3-3.3.", "props": [ @@ -8232,7 +8215,7 @@ ] }, { - "uuid": "04268248-1a17-41b7-988d-366c883ed98d", + "uuid": "5d8629b1-c7f8-4c32-ae92-57781d9750c1", "control-id": "a3-4.1", "description": "The description for control-id a3-4.1.", "props": [ @@ -8245,7 +8228,7 @@ ] }, { - "uuid": "033fa171-e4db-46b2-b652-ff3bd73b8afc", + "uuid": "c47b99de-09de-40af-b9d0-45f7eb2669a7", "control-id": "a3-5.1", "description": "The description for control-id a3-5.1.", "props": [ @@ -8576,7 +8559,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8594,7 +8577,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8666,7 +8649,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -11753,3130 +11736,3106 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_121" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_122" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_122" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_122" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_122" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_123" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_123" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_123" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_123" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_124" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_124" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_124" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_124" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_core_pattern", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dumps", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_core_pattern", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dumps", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cryptsetup-luks_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install cryptsetup Package", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cryptsetup-luks_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install cryptsetup Package", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Red Hat GPG Key Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Red Hat GPG Key Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sequoia-sq_installed", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sequoia-sq Package", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sequoia-sq_installed", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sequoia-sq Package", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_globally_activated", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled In Main dnf Configuration", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_globally_activated", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled In Main dnf Configuration", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_never_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_never_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_db_up_to_date", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_db_up_to_date", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_activation_enabled", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Idle Activation", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_activation_enabled", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Idle Activation", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_enabled", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Lock After Idle Period", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_enabled", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Lock After Idle Period", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_mode_blank", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Blank Screensaver", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_mode_blank", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Blank Screensaver", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gnome_gdm_disable_automatic_login", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GDM Automatic Login", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gnome_gdm_disable_automatic_login", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GDM Automatic Login", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gnome_gdm_disable_guest_login", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GDM Guest Login", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gnome_gdm_disable_guest_login", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GDM Guest Login", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_remember", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_remember", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "securetty_root_login_console_only", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Virtual Console Root Logins", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "securetty_root_login_console_only", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Virtual Console Root Logins", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_privilege_function", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Privileged Executables Are Run", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_privilege_function", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Privileged Executables Are Run", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_tallylog", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - tallylog", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_tallylog", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - tallylog", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_251" + "remarks": "rule_set_250" } ], "control-implementations": [ { - "uuid": "36c19a9f-7b67-4566-ab64-6b3bfe2da2c3", + "uuid": "f8ce4afd-eca1-4f8f-a04e-00d1463f966a", "source": "trestle://profiles/rhel10-pcidss_4-base/profile.json", "description": "Control implementation for pci-dss", "props": [ @@ -15076,7 +15035,7 @@ ], "implemented-requirements": [ { - "uuid": "6df5b31f-6e56-422c-90b5-91a01e5696bf", + "uuid": "b17432a6-0ba7-437e-90b6-3d949ca5f9eb", "control-id": "pcidss_4_1-1.1", "description": "The description for control-id pcidss_4_1-1.1.", "props": [ @@ -15089,7 +15048,7 @@ ] }, { - "uuid": "bbcaa792-8cd4-4141-a451-be651f644aa9", + "uuid": "3f926bcd-37de-42e8-b436-863420c2c628", "control-id": "pcidss_4_1-1.2", "description": "The description for control-id pcidss_4_1-1.2.", "props": [ @@ -15102,7 +15061,7 @@ ] }, { - "uuid": "13bc2c89-3c13-462f-a65d-db09eb8f77a4", + "uuid": "ebc6c55d-0247-489c-b20e-b7d84141d110", "control-id": "pcidss_4_1-2.1", "description": "Examples of NSCs covered by these configuration standards include, but are not limited to,\nfirewalls, routers configured with access control lists, and cloud virtual networks. The\nobjective of this requirement is to ensure the way that NSCs are configured and operate\nare defined and consistently applied. While the tooling and standards can be automated,\nthe review of allowed accesses should be manual as different sites may have different\npolicies.", "props": [ @@ -15134,7 +15093,7 @@ ] }, { - "uuid": "c2243cae-a0c6-4457-ac9c-6fbdbc2d9403", + "uuid": "548e7b91-df7c-4f5f-9a1d-f7be0a87a58c", "control-id": "pcidss_4_1-2.2", "description": "The description for control-id pcidss_4_1-2.2.", "props": [ @@ -15147,7 +15106,7 @@ ] }, { - "uuid": "8b2b758f-4158-49b5-8757-97123634cd51", + "uuid": "98990351-7c21-4487-a11a-a22f56ee3bf9", "control-id": "pcidss_4_1-2.3", "description": "The description for control-id pcidss_4_1-2.3.", "props": [ @@ -15160,7 +15119,7 @@ ] }, { - "uuid": "169f6228-a0e0-43e4-b8a6-79e89ec25318", + "uuid": "7489e45d-7c47-4134-bb9e-0ac7cd883467", "control-id": "pcidss_4_1-2.4", "description": "The description for control-id pcidss_4_1-2.4.", "props": [ @@ -15173,7 +15132,7 @@ ] }, { - "uuid": "b82df07f-fb30-495b-9dec-3a1530851005", + "uuid": "7fc6e06c-c34d-46ed-a401-a784cc328869", "control-id": "pcidss_4_1-2.5", "description": "The description for control-id pcidss_4_1-2.5.", "props": [ @@ -15186,7 +15145,7 @@ ] }, { - "uuid": "bb5611fa-db7e-4b6d-9d99-bfedb69bcd38", + "uuid": "82bf8f49-a102-4c71-83fe-cd819f0db0b9", "control-id": "pcidss_4_1-2.6", "description": "The specific risks associated with the use of insecure services, protocols, and ports are\nunderstood, assessed, and appropriately mitigated. The selected rules here basically\nremove services without encryption and restricted some common services.", "props": [ @@ -15223,7 +15182,7 @@ ] }, { - "uuid": "12875268-b7c9-4a79-9675-c647d0e5adba", + "uuid": "3a165310-1994-4e1c-acba-8392ed76a7cf", "control-id": "pcidss_4_1-2.7", "description": "The description for control-id pcidss_4_1-2.7.", "props": [ @@ -15236,7 +15195,7 @@ ] }, { - "uuid": "4ae0966c-3477-4aa8-86c2-f472e3d83cc3", + "uuid": "42f9328f-bd07-4a2f-acc2-5ba3b4319ffb", "control-id": "pcidss_4_1-2.8", "description": "No notes for control-id 1.2.8.", "props": [ @@ -15268,7 +15227,7 @@ ] }, { - "uuid": "ec7827ec-bf12-446c-9ede-a3a99e545c1a", + "uuid": "b1b78c35-bbd4-4893-88db-630a51fa818b", "control-id": "pcidss_4_1-3.1", "description": "No notes for control-id 1.3.1.", "props": [ @@ -15290,7 +15249,7 @@ ] }, { - "uuid": "053c4bf6-1f3d-48ca-bee3-ca8c43ad8189", + "uuid": "1de4e313-20fb-4faf-9df1-2b3bebc0e011", "control-id": "pcidss_4_1-3.2", "description": "The description for control-id pcidss_4_1-3.2.", "props": [ @@ -15303,7 +15262,7 @@ ] }, { - "uuid": "9159ab4a-210a-4f56-bc79-ae765d973c57", + "uuid": "be271ab1-9eed-4f82-ae06-95625b53555f", "control-id": "pcidss_4_1-3.3", "description": "Wireless interfaces are not expected in servers so they are disabled by default in this\npolicy.", "props": [ @@ -15320,7 +15279,7 @@ ] }, { - "uuid": "c325d909-2f0e-42fc-b040-d64d28c23d44", + "uuid": "7f563eef-ded8-40f9-a4f1-96ac24c18e20", "control-id": "pcidss_4_1-4.1", "description": "Trusted and untrusted networks are expected to be different for each environment.\nBut loopback traffic is assumed to be trusted and even necessary for some services.\nThis requirement is complements 1.2.1 and 1.3.1 requirements.", "props": [ @@ -15342,7 +15301,7 @@ ] }, { - "uuid": "431a4d5f-f930-4062-b652-6881653af3f1", + "uuid": "2d52e949-19b5-4b0b-b5dd-aabe8af11d4c", "control-id": "pcidss_4_1-4.2", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -15379,7 +15338,7 @@ ] }, { - "uuid": "30158866-8b11-4a38-af54-89d27cac4250", + "uuid": "7e0c414b-19c7-4dbe-bfed-ff1e64546bb6", "control-id": "pcidss_4_1-4.3", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -15416,7 +15375,7 @@ ] }, { - "uuid": "4bb720e3-9b17-4d7a-8005-43647d3bec97", + "uuid": "9577a118-5b9b-4228-b5fb-f114e86e1d2e", "control-id": "pcidss_4_1-4.4", "description": "The description for control-id pcidss_4_1-4.4.", "props": [ @@ -15429,7 +15388,7 @@ ] }, { - "uuid": "dc975e76-df03-4dcd-a7a1-20eae4498d85", + "uuid": "a4e611af-d485-42e9-86a4-cabb5a3f2979", "control-id": "pcidss_4_1-4.5", "description": "No notes for control-id 1.4.5.", "props": [ @@ -15456,7 +15415,7 @@ ] }, { - "uuid": "773661da-701d-491c-95b5-2389c13c8c9e", + "uuid": "a056c320-71b8-4454-818b-46326d9cf8bc", "control-id": "pcidss_4_1-5.1", "description": "To ensure this requirement, a manual analysis of site policy and topology is inevitable.\nFrom the technical perspective, previous requirements should already cover this\nrequirement at some level.", "props": [ @@ -15468,7 +15427,7 @@ ] }, { - "uuid": "f3d00b12-e668-4338-b1c8-19295b7a4f98", + "uuid": "71ac7179-5117-4c7c-a2b9-23e9c03ecda5", "control-id": "pcidss_4_2-1.1", "description": "The description for control-id pcidss_4_2-1.1.", "props": [ @@ -15481,7 +15440,7 @@ ] }, { - "uuid": "d2644fc7-e191-4f22-bed7-9683ecc97765", + "uuid": "aa2b6e6a-5fbc-4051-81c7-6bdfd27fe874", "control-id": "pcidss_4_2-1.2", "description": "The description for control-id pcidss_4_2-1.2.", "props": [ @@ -15494,7 +15453,7 @@ ] }, { - "uuid": "eaffc10c-0bd9-4aaf-b3fa-ea97311523b7", + "uuid": "3c82d923-28f7-4062-b039-df640c80b60f", "control-id": "pcidss_4_2-2.1", "description": "Interestingly this requirement recommends other standards, such as Center for Internet\nSecurity (CIS), International Organization for Standardization (ISO), National Institute\nof Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the\nrules included here are very generic in terms of hardening.", "props": [ @@ -15511,7 +15470,7 @@ ] }, { - "uuid": "c3f2770a-ed6d-4ec7-bbcd-f21645f72628", + "uuid": "c9bd8b7d-9ca8-453d-a193-b7ff9f150ec9", "control-id": "pcidss_4_2-2.2", "description": "Also related to requirement 8.2.6 and 8.3.5.", "props": [ @@ -15533,7 +15492,7 @@ ] }, { - "uuid": "002f9fd3-4172-4cb7-9723-32e7c488cd43", + "uuid": "f30f2386-15e8-40cc-b27f-9b3df0986bf9", "control-id": "pcidss_4_2-2.3", "description": "The description for control-id pcidss_4_2-2.3.", "props": [ @@ -15546,7 +15505,7 @@ ] }, { - "uuid": "8c06ec7a-2f5a-48cd-8db7-8a40561ad409", + "uuid": "76384561-edd2-4273-a25e-0b58c4962ac2", "control-id": "pcidss_4_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -15603,7 +15562,7 @@ ] }, { - "uuid": "91e0d21a-1c09-4ee7-bc7f-26be5e76683b", + "uuid": "4cafdbe4-593c-42e8-ac00-7e9daae4c08f", "control-id": "pcidss_4_2-2.5", "description": "The description for control-id pcidss_4_2-2.5.", "props": [ @@ -15616,7 +15575,7 @@ ] }, { - "uuid": "f725a7d5-f8f4-48a4-9e35-6cb6aa91090d", + "uuid": "7335306d-54ad-4c0a-95cf-53223f42bad3", "control-id": "pcidss_4_2-2.6", "description": "This requirement is not specific but also points to 2.2.1, where other policies are\nreferenced. Therefore, the most common rules related to system configuration in order to\nprevent misuse and selected in main profiles are also selected here.", "props": [ @@ -16018,7 +15977,7 @@ ] }, { - "uuid": "7d365dab-bde3-4d88-8535-c770e051fce9", + "uuid": "a63632c3-c5a4-472c-ae9f-4a1929d14e02", "control-id": "pcidss_4_2-2.7", "description": "Related to requirement 12.3.3.", "props": [ @@ -16031,16 +15990,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "5027aa00-e5d8-4ec5-bc8d-c7b10fdbdc0c", + "uuid": "9d6553e5-24e5-47f4-bb42-4c9123f363c8", "control-id": "pcidss_4_2-3.1", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -16052,7 +16006,7 @@ ] }, { - "uuid": "14859664-773a-4db0-92f4-abd3ed9bec83", + "uuid": "c18587ce-b3b5-4bae-b204-cbae4269f17b", "control-id": "pcidss_4_2-3.2", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -16064,7 +16018,7 @@ ] }, { - "uuid": "00fa6700-fc95-40bf-899d-3e1ae07414fd", + "uuid": "b6b0a5b4-2c78-4a62-8d43-f494a3d5cbf9", "control-id": "pcidss_4_3-1.1", "description": "The description for control-id pcidss_4_3-1.1.", "props": [ @@ -16077,7 +16031,7 @@ ] }, { - "uuid": "cb8c068c-79b2-4d0f-af8d-b8f58654c20b", + "uuid": "5dc2eaec-a39b-4a8b-9e8d-7ad4c1f1e2b6", "control-id": "pcidss_4_3-1.2", "description": "The description for control-id pcidss_4_3-1.2.", "props": [ @@ -16090,7 +16044,7 @@ ] }, { - "uuid": "f78f20ce-c6a2-497a-a1d2-de2742f89b22", + "uuid": "7812ed46-19ec-4f34-9190-3d6b67e4fbe1", "control-id": "pcidss_4_3-2.1", "description": "The description for control-id pcidss_4_3-2.1.", "props": [ @@ -16103,7 +16057,7 @@ ] }, { - "uuid": "c77a2995-71a7-458b-aa4f-679e8c3a6801", + "uuid": "365fcc81-aefe-4211-bc31-6a104c93beb7", "control-id": "pcidss_4_3-3.1.1", "description": "This requirement consists in auditing files, databases and memory to make sure the full\ncontent of any track is not unnecessarily stored. It involves manual auditing but some\nautomated rules fit this requirement in order to reduce the chances if this data be\nunintentionally stored in memory.", "props": [ @@ -16145,7 +16099,7 @@ ] }, { - "uuid": "9d88a3a4-4e8a-4317-a978-4329b696eb4f", + "uuid": "a49b46f6-6289-4e9d-8599-68ac2ccd8708", "control-id": "pcidss_4_3-3.1.2", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -16157,7 +16111,7 @@ ] }, { - "uuid": "37de0dc9-1050-4bfd-b494-5f138aba9439", + "uuid": "554daff1-c60d-48f2-89fb-ea5620ef86e2", "control-id": "pcidss_4_3-3.1.3", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -16169,7 +16123,7 @@ ] }, { - "uuid": "47766304-8817-4f15-9cbf-42485160c427", + "uuid": "bbc6e011-29de-4177-a6d5-a91f5b5aa984", "control-id": "pcidss_4_3-3.2", "description": "The description for control-id pcidss_4_3-3.2.", "props": [ @@ -16182,7 +16136,7 @@ ] }, { - "uuid": "21bd6a02-b227-41f4-9997-b61504547eab", + "uuid": "b780a7ea-a319-403f-8793-a6e1e36bfdda", "control-id": "pcidss_4_3-3.3", "description": "The description for control-id pcidss_4_3-3.3.", "props": [ @@ -16195,7 +16149,7 @@ ] }, { - "uuid": "63d3edee-abfa-4e5d-8c17-495f4faa6919", + "uuid": "4d96d6e2-daa9-48dd-87c9-7f986848e09b", "control-id": "pcidss_4_3-4.1", "description": "The description for control-id pcidss_4_3-4.1.", "props": [ @@ -16208,7 +16162,7 @@ ] }, { - "uuid": "58b2e52d-d14e-4406-8116-d7e746d22eb0", + "uuid": "25b52e5f-d3f5-4d69-bf02-bd86d86b4f1f", "control-id": "pcidss_4_3-4.2", "description": "There are technical rules to disable removable storage devices. However, this requirement\nstill demand some manual auditing in documentation and eventual exceptions.", "props": [ @@ -16235,7 +16189,7 @@ ] }, { - "uuid": "2ceb5da2-0156-4d2f-a3e5-19f6df5124d9", + "uuid": "1ff960e3-f7ac-4c83-956b-1912e33612d2", "control-id": "pcidss_4_3-5.1.1", "description": "The description for control-id pcidss_4_3-5.1.1.", "props": [ @@ -16248,7 +16202,7 @@ ] }, { - "uuid": "b739f9e9-24b3-4eb5-ae41-830e5518a775", + "uuid": "6e8390e9-9f16-4f52-80ef-75aca6cf6e6f", "control-id": "pcidss_4_3-5.1.2", "description": "No notes for control-id 3.5.1.2.", "props": [ @@ -16265,7 +16219,7 @@ ] }, { - "uuid": "e19587f4-4e3d-4030-b59a-83b1a4fcd72f", + "uuid": "448b52b1-bf5e-4bb5-81cd-a5fa5bb3651f", "control-id": "pcidss_4_3-5.1.3", "description": "The description for control-id pcidss_4_3-5.1.3.", "props": [ @@ -16278,7 +16232,7 @@ ] }, { - "uuid": "9fec4c59-df30-4700-8458-63218a75f77b", + "uuid": "d6dc9ef2-0678-4bae-976f-866f113af87d", "control-id": "pcidss_4_3-6.1.1", "description": "The description for control-id pcidss_4_3-6.1.1.", "props": [ @@ -16291,7 +16245,7 @@ ] }, { - "uuid": "be3a5023-c59c-40e0-af22-5da5124e1105", + "uuid": "07bf011b-c21d-47db-8391-d7c0e0c2ce22", "control-id": "pcidss_4_3-6.1.2", "description": "The description for control-id pcidss_4_3-6.1.2.", "props": [ @@ -16304,7 +16258,7 @@ ] }, { - "uuid": "2cb00efd-d030-4137-a233-1e884262c6b2", + "uuid": "08d55f4e-77fb-4700-b878-cd9440165a41", "control-id": "pcidss_4_3-6.1.3", "description": "The description for control-id pcidss_4_3-6.1.3.", "props": [ @@ -16317,7 +16271,7 @@ ] }, { - "uuid": "722c0ae0-7b9c-45cd-a398-c44c71b53baf", + "uuid": "6223c05b-3cfe-43f0-9a36-115a38d256c3", "control-id": "pcidss_4_3-6.1.4", "description": "The description for control-id pcidss_4_3-6.1.4.", "props": [ @@ -16330,7 +16284,7 @@ ] }, { - "uuid": "f78e9b20-f421-4239-afc1-378a1157a6a6", + "uuid": "a4ebf347-0f2c-48a0-baf7-ec268b47df61", "control-id": "pcidss_4_3-7.1", "description": "The description for control-id pcidss_4_3-7.1.", "props": [ @@ -16343,7 +16297,7 @@ ] }, { - "uuid": "9a88fda7-8fc7-466d-b8d3-cafc7510c5cc", + "uuid": "20f40a36-ce46-4453-851a-a5bbccf369f8", "control-id": "pcidss_4_3-7.2", "description": "The description for control-id pcidss_4_3-7.2.", "props": [ @@ -16356,7 +16310,7 @@ ] }, { - "uuid": "446a44b7-eb4d-4cd3-b51c-2a7e18047561", + "uuid": "0da24717-b14c-4dd3-b668-e3255a2dc5ac", "control-id": "pcidss_4_3-7.3", "description": "The description for control-id pcidss_4_3-7.3.", "props": [ @@ -16369,7 +16323,7 @@ ] }, { - "uuid": "2a4f46a1-4ee2-422e-987b-228845214604", + "uuid": "3d0db071-3d1c-49e4-b903-b50c7aa6ee1d", "control-id": "pcidss_4_3-7.4", "description": "The description for control-id pcidss_4_3-7.4.", "props": [ @@ -16382,7 +16336,7 @@ ] }, { - "uuid": "41bed6ef-de2c-44c7-8bc7-6eea512b63f6", + "uuid": "9b8f635d-9297-4637-a9c0-198fe8b31e5a", "control-id": "pcidss_4_3-7.5", "description": "The description for control-id pcidss_4_3-7.5.", "props": [ @@ -16395,7 +16349,7 @@ ] }, { - "uuid": "f773f504-a136-442e-8363-54a16d79f218", + "uuid": "5afcc0e4-d2c2-46d4-b85a-9f00a96958a6", "control-id": "pcidss_4_3-7.6", "description": "The description for control-id pcidss_4_3-7.6.", "props": [ @@ -16408,7 +16362,7 @@ ] }, { - "uuid": "925a9d52-ca13-4dd1-9eef-1c02f2071e36", + "uuid": "27bb29d3-8fb7-4c69-a243-1149e84c09bc", "control-id": "pcidss_4_3-7.7", "description": "The description for control-id pcidss_4_3-7.7.", "props": [ @@ -16421,7 +16375,7 @@ ] }, { - "uuid": "fa746d8b-1f20-4d00-b2ac-89936b9c1fa0", + "uuid": "a9996c37-a9dd-48c4-8152-21e6413d004d", "control-id": "pcidss_4_3-7.8", "description": "The description for control-id pcidss_4_3-7.8.", "props": [ @@ -16434,7 +16388,7 @@ ] }, { - "uuid": "aa006234-1e47-440a-8db6-4c763ef7b29c", + "uuid": "3af59af9-92a3-4f58-a688-be00f7dd732e", "control-id": "pcidss_4_3-7.9", "description": "The description for control-id pcidss_4_3-7.9.", "props": [ @@ -16447,7 +16401,7 @@ ] }, { - "uuid": "55e2ab03-e769-4447-9059-27fa67561f1b", + "uuid": "f6eb4276-9263-43b7-9319-189c19d16e49", "control-id": "pcidss_4_4-1.1", "description": "The description for control-id pcidss_4_4-1.1.", "props": [ @@ -16460,7 +16414,7 @@ ] }, { - "uuid": "43dd52af-b6a1-4eb2-837a-bd57c8805447", + "uuid": "ee00e7af-a7a7-42a4-85ca-2e7c58d033c9", "control-id": "pcidss_4_4-1.2", "description": "The description for control-id pcidss_4_4-1.2.", "props": [ @@ -16473,7 +16427,7 @@ ] }, { - "uuid": "2dd7364f-76ea-448b-b467-b1070cbf140a", + "uuid": "6a1480cc-2437-495a-ac3a-6ab153a119b3", "control-id": "pcidss_4_4-2.1.1", "description": "The description for control-id pcidss_4_4-2.1.1.", "props": [ @@ -16486,7 +16440,7 @@ ] }, { - "uuid": "9cbc0c91-5e76-4fd1-860d-39bf41f4902f", + "uuid": "48fc0198-61cd-41dc-96a1-32e347955266", "control-id": "pcidss_4_4-2.1.2", "description": "The description for control-id pcidss_4_4-2.1.2.", "props": [ @@ -16499,7 +16453,7 @@ ] }, { - "uuid": "7b01212f-defa-4cc5-98d9-afebd418ca31", + "uuid": "92641c59-684b-4b25-a1b8-8dbe8bc0627b", "control-id": "pcidss_4_4-2.2", "description": "The description for control-id pcidss_4_4-2.2.", "props": [ @@ -16512,7 +16466,7 @@ ] }, { - "uuid": "d4fc4337-1e69-4983-8ab7-dd18dfd84667", + "uuid": "1514e42d-e045-4095-9263-c7e1e0a148ed", "control-id": "pcidss_4_5-1.1", "description": "The description for control-id pcidss_4_5-1.1.", "props": [ @@ -16525,7 +16479,7 @@ ] }, { - "uuid": "af24f75a-b627-485a-9948-056d934105ef", + "uuid": "5f5ec1e8-52ca-4ad4-92c2-48b12068345c", "control-id": "pcidss_4_5-1.2", "description": "The description for control-id pcidss_4_5-1.2.", "props": [ @@ -16538,7 +16492,7 @@ ] }, { - "uuid": "ca9ad5c9-e3e1-4688-b60f-35ebda83861c", + "uuid": "0af4e496-3938-4653-bf36-9f8985c8ea15", "control-id": "pcidss_4_5-2.1", "description": "There are many options of anti-malware and the criteria for any adopted solution or\napproach relies on each site policy. Technologies are supported but manual assessment is\nrequired.", "props": [ @@ -16550,7 +16504,7 @@ ] }, { - "uuid": "32524bea-c726-4f43-82cf-6b6a13e05f3b", + "uuid": "c2907b49-1139-40bd-bb8a-34a3270ef704", "control-id": "pcidss_4_5-2.2", "description": "The description for control-id pcidss_4_5-2.2.", "props": [ @@ -16563,7 +16517,7 @@ ] }, { - "uuid": "9fc64eef-8e8f-4e70-a68a-3eb911a037e6", + "uuid": "c130278e-bf20-4556-8588-f8508f9f59df", "control-id": "pcidss_4_5-2.3.1", "description": "The description for control-id pcidss_4_5-2.3.1.", "props": [ @@ -16576,7 +16530,7 @@ ] }, { - "uuid": "c6698a14-1599-4b46-8ab9-05a2e94428f2", + "uuid": "2079bcc9-296f-45ca-989e-d5bfc8298e1a", "control-id": "pcidss_4_5-3.1", "description": "The description for control-id pcidss_4_5-3.1.", "props": [ @@ -16589,7 +16543,7 @@ ] }, { - "uuid": "7e5cb81f-308b-495e-9c59-d267176c622c", + "uuid": "68e8a428-7422-46d6-9556-99aba5693ff2", "control-id": "pcidss_4_5-3.2.1", "description": "The description for control-id pcidss_4_5-3.2.1.", "props": [ @@ -16602,7 +16556,7 @@ ] }, { - "uuid": "a1bf7463-a885-41b7-be21-32d04154d344", + "uuid": "34cca034-05e8-4659-9823-a3d806ae7289", "control-id": "pcidss_4_5-3.3", "description": "The description for control-id pcidss_4_5-3.3.", "props": [ @@ -16615,7 +16569,7 @@ ] }, { - "uuid": "915926ab-4e56-46cf-8916-5c36d98acbfa", + "uuid": "564c674d-2e36-43cb-a3f8-de914b8447f0", "control-id": "pcidss_4_5-3.4", "description": "The description for control-id pcidss_4_5-3.4.", "props": [ @@ -16628,7 +16582,7 @@ ] }, { - "uuid": "c702e287-1124-47e7-b12d-f22fd8bd6d40", + "uuid": "5205d0f0-a3b5-4b39-82e9-a38a382bd6c0", "control-id": "pcidss_4_5-3.5", "description": "The description for control-id pcidss_4_5-3.5.", "props": [ @@ -16641,7 +16595,7 @@ ] }, { - "uuid": "9d669776-c0d7-4ec7-899a-e49898bbd843", + "uuid": "3572358a-6c8c-4ccf-a772-2147c7d0529d", "control-id": "pcidss_4_5-4.1", "description": "The description for control-id pcidss_4_5-4.1.", "props": [ @@ -16654,7 +16608,7 @@ ] }, { - "uuid": "1d7f8873-cb35-4f18-bfc0-6282153ec228", + "uuid": "b75ca7f6-651b-4fd4-84dc-500d947616bf", "control-id": "pcidss_4_6-1.1", "description": "The description for control-id pcidss_4_6-1.1.", "props": [ @@ -16667,7 +16621,7 @@ ] }, { - "uuid": "422d9aa7-b0a1-441a-8871-80c230179a43", + "uuid": "0783416a-3327-46ad-9119-3547ea214be1", "control-id": "pcidss_4_6-1.2", "description": "The description for control-id pcidss_4_6-1.2.", "props": [ @@ -16680,7 +16634,7 @@ ] }, { - "uuid": "96593e8a-ccf3-4785-8f34-95a07fa3fd6e", + "uuid": "0da76731-9391-4f76-b1ec-ad1d343e18e9", "control-id": "pcidss_4_6-2.1", "description": "The description for control-id pcidss_4_6-2.1.", "props": [ @@ -16693,7 +16647,7 @@ ] }, { - "uuid": "53b8ba7b-1b1e-4601-b603-88ef8744f914", + "uuid": "c84f7f64-2d10-41aa-adb9-fb66278de907", "control-id": "pcidss_4_6-2.2", "description": "The description for control-id pcidss_4_6-2.2.", "props": [ @@ -16706,7 +16660,7 @@ ] }, { - "uuid": "49203f27-58f7-4d97-a331-d77922edbd93", + "uuid": "b8a4bb5a-c72c-419e-a386-191ad283aa11", "control-id": "pcidss_4_6-2.3.1", "description": "The description for control-id pcidss_4_6-2.3.1.", "props": [ @@ -16719,7 +16673,7 @@ ] }, { - "uuid": "a2766dbc-260a-4f48-a5d0-aeb82cee5265", + "uuid": "ff58c5cb-00ad-4a06-b13d-82d5f2278bc5", "control-id": "pcidss_4_6-2.4", "description": "The description for control-id pcidss_4_6-2.4.", "props": [ @@ -16732,7 +16686,7 @@ ] }, { - "uuid": "4d2747fe-7b36-4ab3-b943-9b39a53ad59a", + "uuid": "2f1e4ecc-ce2c-47de-b209-89f83d2bf58b", "control-id": "pcidss_4_6-3.1", "description": "The description for control-id pcidss_4_6-3.1.", "props": [ @@ -16745,7 +16699,7 @@ ] }, { - "uuid": "eb07b638-094e-4a5d-bdbe-c48ff09e5280", + "uuid": "f6714dc6-d565-4040-ab33-6eaaac420a7a", "control-id": "pcidss_4_6-3.2", "description": "The description for control-id pcidss_4_6-3.2.", "props": [ @@ -16758,7 +16712,7 @@ ] }, { - "uuid": "00ba2d6e-80a0-4488-9b59-a36cf7b67b98", + "uuid": "737ef252-e26d-410c-8727-a073da34989d", "control-id": "pcidss_4_6-3.3", "description": "No notes for control-id 6.3.3.", "props": [ @@ -16790,7 +16744,7 @@ ] }, { - "uuid": "75122bed-96d8-49b8-b446-48a05fb851ff", + "uuid": "08aa3852-e39a-4c9c-b7fb-7094146c5b93", "control-id": "pcidss_4_6-4.1", "description": "The description for control-id pcidss_4_6-4.1.", "props": [ @@ -16803,7 +16757,7 @@ ] }, { - "uuid": "b907d6a7-8f60-4cbd-ac79-fe7bd7a25fc6", + "uuid": "1dc024cb-f95f-428a-b80b-1fca0ca3518d", "control-id": "pcidss_4_6-4.2", "description": "The description for control-id pcidss_4_6-4.2.", "props": [ @@ -16816,7 +16770,7 @@ ] }, { - "uuid": "6455831d-cb14-4b2c-b89f-6c5bc17115af", + "uuid": "9b6eca03-cfd7-4a33-865e-372a2d7aeb95", "control-id": "pcidss_4_6-4.3", "description": "The description for control-id pcidss_4_6-4.3.", "props": [ @@ -16829,7 +16783,7 @@ ] }, { - "uuid": "ec84557c-e5e0-4f67-9ed0-7e86213849b5", + "uuid": "96127769-cfe8-4b4d-851c-8fd13a158f0f", "control-id": "pcidss_4_6-5.1", "description": "The description for control-id pcidss_4_6-5.1.", "props": [ @@ -16842,7 +16796,7 @@ ] }, { - "uuid": "e7e1f087-4a21-48d0-a3d9-d642f2474c73", + "uuid": "404d5c8d-1014-4005-99b2-7d7ab1caee56", "control-id": "pcidss_4_6-5.2", "description": "The description for control-id pcidss_4_6-5.2.", "props": [ @@ -16855,7 +16809,7 @@ ] }, { - "uuid": "6329a3ae-bade-418b-84f5-8ad50620ea0a", + "uuid": "d944e22d-1d47-4897-8169-42d1bdd8b94a", "control-id": "pcidss_4_6-5.3", "description": "The description for control-id pcidss_4_6-5.3.", "props": [ @@ -16868,7 +16822,7 @@ ] }, { - "uuid": "a8433409-8120-4922-b730-c4f1f6b62793", + "uuid": "f78e542c-075c-4b2a-ac26-2244cbecb1b1", "control-id": "pcidss_4_6-5.4", "description": "The description for control-id pcidss_4_6-5.4.", "props": [ @@ -16881,7 +16835,7 @@ ] }, { - "uuid": "de95caa5-f3f9-4fea-b03b-4c34f3554bd9", + "uuid": "bddab2c7-8102-4390-863e-bf6e0e3a812b", "control-id": "pcidss_4_6-5.5", "description": "The description for control-id pcidss_4_6-5.5.", "props": [ @@ -16894,7 +16848,7 @@ ] }, { - "uuid": "1a5869b0-0fe4-40fe-b6db-71bf9817eeee", + "uuid": "f74d36ae-d9a8-4f93-8e2a-b2a6703e81f3", "control-id": "pcidss_4_6-5.6", "description": "The description for control-id pcidss_4_6-5.6.", "props": [ @@ -16907,7 +16861,7 @@ ] }, { - "uuid": "f351ab80-a131-42de-9f70-c49acee7f0f3", + "uuid": "1d10ac47-ee6d-485d-a0b9-1de175ffa3e2", "control-id": "pcidss_4_7-1.1", "description": "The description for control-id pcidss_4_7-1.1.", "props": [ @@ -16920,7 +16874,7 @@ ] }, { - "uuid": "c172efbb-1eed-421b-9eb0-ed2389b41462", + "uuid": "fbfb5063-5029-43e6-ba0f-eac33709cb55", "control-id": "pcidss_4_7-1.2", "description": "The description for control-id pcidss_4_7-1.2.", "props": [ @@ -16933,7 +16887,7 @@ ] }, { - "uuid": "508d554d-549f-4615-8b74-f38334c0165d", + "uuid": "11f79e8b-b9fc-4d1c-95c9-5741f3eccd3a", "control-id": "pcidss_4_7-2.1", "description": "The description for control-id pcidss_4_7-2.1.", "props": [ @@ -16946,7 +16900,7 @@ ] }, { - "uuid": "163d47bd-74ad-4573-81c2-fe1d11bbf312", + "uuid": "960c02c9-2150-43b6-8ed5-871ece3dc8f4", "control-id": "pcidss_4_7-2.2", "description": "The description for control-id pcidss_4_7-2.2.", "props": [ @@ -16959,7 +16913,7 @@ ] }, { - "uuid": "33cdaf7b-e060-41e7-81fa-8ac9a3327988", + "uuid": "73ff38f8-4d74-4f7e-b0b9-5c6b6955523c", "control-id": "pcidss_4_7-2.3", "description": "The description for control-id pcidss_4_7-2.3.", "props": [ @@ -16972,7 +16926,7 @@ ] }, { - "uuid": "2c4774b3-12ed-451a-b748-1949ad420eee", + "uuid": "f4d3d115-df27-4bfe-a420-968632a036ef", "control-id": "pcidss_4_7-2.4", "description": "The description for control-id pcidss_4_7-2.4.", "props": [ @@ -16985,7 +16939,7 @@ ] }, { - "uuid": "60b4db24-6541-4685-9e9d-df896bf5de0c", + "uuid": "4aff15ef-fe43-4c8e-925a-f2c060e67ad8", "control-id": "pcidss_4_7-2.5.1", "description": "The description for control-id pcidss_4_7-2.5.1.", "props": [ @@ -16998,7 +16952,7 @@ ] }, { - "uuid": "6c22dee7-8625-4737-8da4-89544f5f96fa", + "uuid": "35fdfd7e-bbd7-4c09-9594-79a6b56d9cfe", "control-id": "pcidss_4_7-2.6", "description": "The description for control-id pcidss_4_7-2.6.", "props": [ @@ -17011,7 +16965,7 @@ ] }, { - "uuid": "f2f41e04-3246-423c-835f-0898e11e8e70", + "uuid": "069f1de0-50f0-4d6f-aa26-7c1131d05f22", "control-id": "pcidss_4_7-3.1", "description": "The description for control-id pcidss_4_7-3.1.", "props": [ @@ -17024,7 +16978,7 @@ ] }, { - "uuid": "5c32aae8-9262-46cf-bf34-64237a4c8d3f", + "uuid": "4745a3a3-07d0-492a-98a8-51053567089d", "control-id": "pcidss_4_7-3.2", "description": "The description for control-id pcidss_4_7-3.2.", "props": [ @@ -17037,7 +16991,7 @@ ] }, { - "uuid": "4fd48b51-9b76-46c0-ad66-b4c0f28309c9", + "uuid": "4adcce37-f3f0-4ac8-980c-d04b422256a4", "control-id": "pcidss_4_7-3.3", "description": "The description for control-id pcidss_4_7-3.3.", "props": [ @@ -17050,7 +17004,7 @@ ] }, { - "uuid": "6c820426-6eba-484f-8e8f-0fedc846b653", + "uuid": "37d6915c-284b-4122-b979-cb38bf1759d7", "control-id": "pcidss_4_8-1.1", "description": "The description for control-id pcidss_4_8-1.1.", "props": [ @@ -17063,7 +17017,7 @@ ] }, { - "uuid": "42c07623-8ca5-4095-8654-f86ed1fe9363", + "uuid": "80f4774b-91bc-4c62-9da8-bfc729cc991a", "control-id": "pcidss_4_8-1.2", "description": "The description for control-id pcidss_4_8-1.2.", "props": [ @@ -17076,7 +17030,7 @@ ] }, { - "uuid": "b911fae4-705d-4376-a035-f0cd5a17c93c", + "uuid": "57d5533b-f1eb-4644-9c33-72b3f3eedd10", "control-id": "pcidss_4_8-2.1", "description": "The description for control-id pcidss_4_8-2.1.", "props": [ @@ -17119,7 +17073,7 @@ ] }, { - "uuid": "30d89b2e-dcbd-45ab-a39a-cfc4d7180ce1", + "uuid": "b6ae4848-49c1-4041-b63c-a98ec29c9721", "control-id": "pcidss_4_8-2.2", "description": "This requirement is complemented by 8.2.1 and related to 8.3.5.", "props": [ @@ -17146,7 +17100,7 @@ ] }, { - "uuid": "6ed1e7cf-e9a3-42ef-a49c-82883a94cc94", + "uuid": "037c4155-9a00-4f7a-913c-651323d40572", "control-id": "pcidss_4_8-2.3", "description": "The description for control-id pcidss_4_8-2.3.", "props": [ @@ -17159,7 +17113,7 @@ ] }, { - "uuid": "1d632c27-ed44-41db-8666-fe11b7625e4e", + "uuid": "d8eadc19-87cb-411e-9533-29ec91703fed", "control-id": "pcidss_4_8-2.4", "description": "The description for control-id pcidss_4_8-2.4.", "props": [ @@ -17172,7 +17126,7 @@ ] }, { - "uuid": "85a3f6a2-3788-4c0a-8c9f-16948fdd27ad", + "uuid": "b4ce2520-dea6-48ba-a96a-3a0f7d621595", "control-id": "pcidss_4_8-2.5", "description": "The description for control-id pcidss_4_8-2.5.", "props": [ @@ -17185,7 +17139,7 @@ ] }, { - "uuid": "7052f529-8584-4e39-aa47-52b2bbee9820", + "uuid": "39dad4ea-7b1e-4df9-b614-250d6b2095f0", "control-id": "pcidss_4_8-2.6", "description": "Also related to requirements 2.2.2 and 8.3.5.", "props": [ @@ -17207,7 +17161,7 @@ ] }, { - "uuid": "8801c32a-4a3e-4def-8617-cf9bbc29f254", + "uuid": "4f952b62-85f3-4588-9f9a-a87862ad8b94", "control-id": "pcidss_4_8-2.7", "description": "The description for control-id pcidss_4_8-2.7.", "props": [ @@ -17220,7 +17174,7 @@ ] }, { - "uuid": "029c9ff7-7235-4351-ad18-4a653f36f022", + "uuid": "67a24a42-19ac-425f-8a50-1f1d3a432269", "control-id": "pcidss_4_8-2.8", "description": "No notes for control-id 8.2.8.", "props": [ @@ -17277,7 +17231,7 @@ ] }, { - "uuid": "1bdb8711-7a0e-4eb0-939d-dcef49050614", + "uuid": "e1f2577a-9dbc-49bf-a60b-2acf2ee4c161", "control-id": "pcidss_4_8-3.1", "description": "No notes for control-id 8.3.1.", "props": [ @@ -17309,7 +17263,7 @@ ] }, { - "uuid": "db5e42ca-b08a-4212-9e25-a2cc9b2c4204", + "uuid": "19736325-0a40-4db0-9090-081d32aefd8d", "control-id": "pcidss_4_8-3.2", "description": "There are similar rules that might be redundant for some distros.", "props": [ @@ -17341,7 +17295,7 @@ ] }, { - "uuid": "ee0717ee-b53b-4c4d-8210-0ddb1e1b2d79", + "uuid": "ee65adee-013d-48c4-972f-e1c871b1f13c", "control-id": "pcidss_4_8-3.3", "description": "The description for control-id pcidss_4_8-3.3.", "props": [ @@ -17354,7 +17308,7 @@ ] }, { - "uuid": "e91b5cde-9c29-4f6f-8c71-54f1b97c5465", + "uuid": "f8f867e9-a538-477d-9454-9b0b22829841", "control-id": "pcidss_4_8-3.4", "description": "No notes for control-id 8.3.4.", "props": [ @@ -17376,7 +17330,7 @@ ] }, { - "uuid": "252477cc-3ba6-4afe-b21e-919ed6f1bb3c", + "uuid": "7f7732dd-ad9f-4fda-ad64-c329818680aa", "control-id": "pcidss_4_8-3.5", "description": "Also related to requirement 2.2.2, 8.2.2 and 8.2.6.", "props": [ @@ -17393,7 +17347,7 @@ ] }, { - "uuid": "5901a6f1-e67b-464c-84b0-d8e41a3d1e80", + "uuid": "1ce35e28-21a7-4d38-ab20-533675a7e6b6", "control-id": "pcidss_4_8-3.6", "description": "This requirement is not intended to apply to:\n- User accounts on point-of-sale terminals that have access to only one card number at a\ntime to facilitate a single transaction (such as IDs used by cashiers on point-of-sale\nterminals).\n- Application or system accounts, which are governed by requirements in section 8.6.", "props": [ @@ -17420,7 +17374,7 @@ ] }, { - "uuid": "0273be09-e61a-4aec-b61e-61bd3ec11497", + "uuid": "87d97830-95dc-448a-8a2b-6b8abf3591a2", "control-id": "pcidss_4_8-3.7", "description": "This requirement is not intended to apply to user accounts on point-of-sale terminals that\nhave access to only one card number at a time to facilitate a single transaction (such as\nIDs used by cashiers on point-of-sale terminals).\nFor RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be\nprefered in detriment of accounts_password_pam_unix_remember. Using both should not create\nconflict but is unnecessary and the last should be filtered out from the profile.", "props": [ @@ -17447,7 +17401,7 @@ ] }, { - "uuid": "ab690703-e920-48ee-b3e8-3b8bbbc80356", + "uuid": "ca5518cc-4e74-4f83-8321-d130d05147d1", "control-id": "pcidss_4_8-3.8", "description": "The description for control-id pcidss_4_8-3.8.", "props": [ @@ -17460,7 +17414,7 @@ ] }, { - "uuid": "1337a4ae-39d7-4447-b67f-f915cfc7ed51", + "uuid": "c816bff2-3ac4-41af-aab0-ba2212abc165", "control-id": "pcidss_4_8-3.9", "description": "The requirement does not explicitily define the number of days before the password\nexpiration to warn the users, but the relevant rules were selected here as they do not\ncause any problems in combination with password lifetime rules.", "props": [ @@ -17492,7 +17446,7 @@ ] }, { - "uuid": "f8a47ee0-dfbb-4509-89de-45139f2feef0", + "uuid": "ac66e2ba-3800-4b0f-994d-135caa4d7926", "control-id": "pcidss_4_8-3.10.1", "description": "This requirement is already covered by 8.3.9.", "props": [ @@ -17504,7 +17458,7 @@ ] }, { - "uuid": "544b42ad-cadf-4060-aec7-1e4c083eb338", + "uuid": "d4d2e4b7-f1a7-4b08-b863-83e0b76f7348", "control-id": "pcidss_4_8-3.11", "description": "The description for control-id pcidss_4_8-3.11.", "props": [ @@ -17517,7 +17471,7 @@ ] }, { - "uuid": "dd81e452-dfd3-474b-874c-149ca927c4c2", + "uuid": "2df202be-3a7a-4c03-906a-34843e35c110", "control-id": "pcidss_4_8-4.1", "description": "No notes for control-id 8.4.1.", "props": [ @@ -17529,7 +17483,7 @@ ] }, { - "uuid": "b15a06d5-884e-4810-b7ca-9ee0ef177764", + "uuid": "e6325c59-72aa-4568-af48-1b052ad72723", "control-id": "pcidss_4_8-4.2", "description": "The description for control-id pcidss_4_8-4.2.", "props": [ @@ -17542,7 +17496,7 @@ ] }, { - "uuid": "acd63d47-0710-4122-bcd7-70e391f42954", + "uuid": "c9cbc329-f328-4aa2-a7ce-4dda58c8e5c2", "control-id": "pcidss_4_8-4.3", "description": "The description for control-id pcidss_4_8-4.3.", "props": [ @@ -17555,7 +17509,7 @@ ] }, { - "uuid": "57441db0-fbd2-4ec0-b59d-51dbeddda268", + "uuid": "b4c14059-5b9a-4687-bf9d-ed46e2a912cf", "control-id": "pcidss_4_8-5.1", "description": "The description for control-id pcidss_4_8-5.1.", "props": [ @@ -17568,7 +17522,7 @@ ] }, { - "uuid": "601ba051-5626-4274-a45a-4f13ad0e7b4a", + "uuid": "8bda1ca3-bde5-4c82-b131-ce86631d95c2", "control-id": "pcidss_4_8-6.1", "description": "This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system\naccounts usage is restricted. Exceptions to system accounts should be manually checked to\nensure the requirements in description. This requirement although implements some extra\ncontrols regarding root account.", "props": [ @@ -17595,7 +17549,7 @@ ] }, { - "uuid": "ca896e2e-f86c-46cc-b796-adf41c0486e2", + "uuid": "c6fd7dc9-9062-4a92-97b9-0dfede71026f", "control-id": "pcidss_4_8-6.2", "description": "The description for control-id pcidss_4_8-6.2.", "props": [ @@ -17608,7 +17562,7 @@ ] }, { - "uuid": "09a8c4c3-3dd8-495d-913e-ecf0717a2c42", + "uuid": "ad559286-7c85-451d-a138-8c32ed902029", "control-id": "pcidss_4_8-6.3", "description": "Related to requirements 8.3.6 and 8.3.9.", "props": [ @@ -17620,7 +17574,7 @@ ] }, { - "uuid": "0de668e2-15cb-48f7-9844-88f7600e7da7", + "uuid": "92b06ed4-2596-488c-a346-8f282ba2e977", "control-id": "pcidss_4_9-1.1", "description": "The description for control-id pcidss_4_9-1.1.", "props": [ @@ -17633,7 +17587,7 @@ ] }, { - "uuid": "5e2bc6ea-c879-4411-9417-587778af92d3", + "uuid": "b993a212-1db8-46fb-ac5c-5ec2364aa390", "control-id": "pcidss_4_9-1.2", "description": "The description for control-id pcidss_4_9-1.2.", "props": [ @@ -17646,7 +17600,7 @@ ] }, { - "uuid": "f72462e3-3f0b-4830-afa5-bf8525706c35", + "uuid": "c3b9e7ab-a180-46d3-97cb-3001c1b51df9", "control-id": "pcidss_4_9-2.1.1", "description": "The description for control-id pcidss_4_9-2.1.1.", "props": [ @@ -17659,7 +17613,7 @@ ] }, { - "uuid": "c362e2fb-1119-4f10-9fe4-bdfd08803d50", + "uuid": "1c3913fb-1a01-4ea2-acfe-9608e20e5659", "control-id": "pcidss_4_9-2.2", "description": "The description for control-id pcidss_4_9-2.2.", "props": [ @@ -17672,7 +17626,7 @@ ] }, { - "uuid": "81b1eb52-5745-4c3c-b38f-fc74ee3f2a96", + "uuid": "5e18257a-9fb9-45e2-b022-d0a69f4099e0", "control-id": "pcidss_4_9-2.3", "description": "The description for control-id pcidss_4_9-2.3.", "props": [ @@ -17685,7 +17639,7 @@ ] }, { - "uuid": "fe3cd312-f3a1-4a37-ae74-e71392dc9a04", + "uuid": "6842662d-d9a1-4ea0-8a12-09ca675ac3ef", "control-id": "pcidss_4_9-2.4", "description": "The description for control-id pcidss_4_9-2.4.", "props": [ @@ -17698,7 +17652,7 @@ ] }, { - "uuid": "c07576e5-ab9e-4910-ba66-4e85c205a008", + "uuid": "3a780300-2912-4a54-9760-fc2f06532a6d", "control-id": "pcidss_4_9-3.1.1", "description": "The description for control-id pcidss_4_9-3.1.1.", "props": [ @@ -17711,7 +17665,7 @@ ] }, { - "uuid": "fd246425-f682-4161-8446-8f300389904c", + "uuid": "8b454213-affa-459f-b488-c8e0d7702e45", "control-id": "pcidss_4_9-3.2", "description": "The description for control-id pcidss_4_9-3.2.", "props": [ @@ -17724,7 +17678,7 @@ ] }, { - "uuid": "8acdc158-9c3e-4684-b024-ca12d6b864fb", + "uuid": "cc477c48-f90f-41a2-a040-00262bfb27b7", "control-id": "pcidss_4_9-3.3", "description": "The description for control-id pcidss_4_9-3.3.", "props": [ @@ -17737,7 +17691,7 @@ ] }, { - "uuid": "c53c9350-f395-4fc4-9a70-650e46ef9d75", + "uuid": "ffe4cd55-67c1-447a-99e9-5206d1e95a89", "control-id": "pcidss_4_9-3.4", "description": "The description for control-id pcidss_4_9-3.4.", "props": [ @@ -17750,7 +17704,7 @@ ] }, { - "uuid": "b4fd322e-08f7-4f20-b2d9-bfa0737f1b93", + "uuid": "11c94945-3d23-4a1f-a104-0b9524ca84cc", "control-id": "pcidss_4_9-4.1.1", "description": "The description for control-id pcidss_4_9-4.1.1.", "props": [ @@ -17763,7 +17717,7 @@ ] }, { - "uuid": "a325ce8f-aeb9-4d1e-8e89-dce035311164", + "uuid": "0899f8aa-f8a0-4ec8-a5fd-2b820c19786c", "control-id": "pcidss_4_9-4.1.2", "description": "The description for control-id pcidss_4_9-4.1.2.", "props": [ @@ -17776,7 +17730,7 @@ ] }, { - "uuid": "ae590699-8c34-4e17-8182-7ffec0f6bf2a", + "uuid": "07116f55-ceb5-4676-b946-6760fdee7639", "control-id": "pcidss_4_9-4.2", "description": "The description for control-id pcidss_4_9-4.2.", "props": [ @@ -17789,7 +17743,7 @@ ] }, { - "uuid": "5a1bb062-32ab-43dd-8a38-0118657138f2", + "uuid": "e80168df-887f-44bb-871e-17a52ff55beb", "control-id": "pcidss_4_9-4.3", "description": "The description for control-id pcidss_4_9-4.3.", "props": [ @@ -17802,7 +17756,7 @@ ] }, { - "uuid": "5d50f2d6-e49e-4acf-b022-eaf2aeb8744b", + "uuid": "5b6fdeb0-0efd-4116-8993-ced5b85d4786", "control-id": "pcidss_4_9-4.4", "description": "The description for control-id pcidss_4_9-4.4.", "props": [ @@ -17815,7 +17769,7 @@ ] }, { - "uuid": "16bb9d48-c45c-4916-b994-b6a3981cc270", + "uuid": "21c37737-99e2-48fe-95c1-6819b3ef9dff", "control-id": "pcidss_4_9-4.5.1", "description": "The description for control-id pcidss_4_9-4.5.1.", "props": [ @@ -17828,7 +17782,7 @@ ] }, { - "uuid": "2af9468c-b654-4807-a23c-7a950ab9c3a6", + "uuid": "86046e33-b312-4025-a0fb-87bc2bf56855", "control-id": "pcidss_4_9-4.6", "description": "The description for control-id pcidss_4_9-4.6.", "props": [ @@ -17841,7 +17795,7 @@ ] }, { - "uuid": "29a51c92-b1e0-4ce9-b7fa-f9033297db3c", + "uuid": "62716e77-7ea8-4ecc-a38e-a9d69b86bd3d", "control-id": "pcidss_4_9-4.7", "description": "The description for control-id pcidss_4_9-4.7.", "props": [ @@ -17854,7 +17808,7 @@ ] }, { - "uuid": "3705dd7d-19fe-4d9f-b001-aa78ab57c861", + "uuid": "e2ccc030-e15e-45f8-ae10-8aea963bf443", "control-id": "pcidss_4_9-5.1.1", "description": "The description for control-id pcidss_4_9-5.1.1.", "props": [ @@ -17867,7 +17821,7 @@ ] }, { - "uuid": "f1a0c91d-b41a-4583-8bf8-4e1320e23519", + "uuid": "c6ccfd52-6b2c-4450-a00a-fa7079850557", "control-id": "pcidss_4_9-5.1.2.1", "description": "The description for control-id pcidss_4_9-5.1.2.1.", "props": [ @@ -17880,7 +17834,7 @@ ] }, { - "uuid": "e6a820f6-ca5e-4016-9f41-494efd55e111", + "uuid": "7791edbe-c664-499d-8684-b97a19cc6715", "control-id": "pcidss_4_9-5.1.3", "description": "The description for control-id pcidss_4_9-5.1.3.", "props": [ @@ -17893,7 +17847,7 @@ ] }, { - "uuid": "c4f39dc6-021d-483a-ab56-f71c901f2abd", + "uuid": "c845a1c4-e2e3-40f5-9edb-d8b9d081d60a", "control-id": "pcidss_4_10-1.1", "description": "The description for control-id pcidss_4_10-1.1.", "props": [ @@ -17906,7 +17860,7 @@ ] }, { - "uuid": "742ded6f-0391-4df2-a7f6-1e4fe7c9250f", + "uuid": "152d3abc-18c3-422d-b29a-aaa9eddcd648", "control-id": "pcidss_4_10-1.2", "description": "The description for control-id pcidss_4_10-1.2.", "props": [ @@ -17919,7 +17873,7 @@ ] }, { - "uuid": "3b1514ba-b040-4703-84a4-646032c6a4d1", + "uuid": "dffbcee5-ab72-41ce-ad8d-1d269da97e74", "control-id": "pcidss_4_10-2.1.1", "description": "The description for control-id pcidss_4_10-2.1.1.", "props": [ @@ -17932,7 +17886,7 @@ ] }, { - "uuid": "9be33227-b0ab-4e94-a996-97b884066b5c", + "uuid": "0c684a86-2f7a-4cd4-a1d5-5cc2880f0c5a", "control-id": "pcidss_4_10-2.1.2", "description": "Not all privileged commands have suid or sgid enabled. We probably want to include more\nrules for this requirement.", "props": [ @@ -17949,7 +17903,7 @@ ] }, { - "uuid": "4bd0c176-7aa3-449c-a354-30f0ccc84384", + "uuid": "440b46d5-221c-4afc-85e3-b813599d537f", "control-id": "pcidss_4_10-2.1.3", "description": "No notes for control-id 10.2.1.3.", "props": [ @@ -17996,7 +17950,7 @@ ] }, { - "uuid": "d491404d-a3b0-4c03-9f60-9e55b6523a80", + "uuid": "f35eae35-7a02-4362-8fe7-15b49505ef59", "control-id": "pcidss_4_10-2.1.4", "description": "No notes for control-id 10.2.1.4.", "props": [ @@ -18013,7 +17967,7 @@ ] }, { - "uuid": "f0020751-9b80-484a-bcba-a3740e638628", + "uuid": "b25a4be4-a16b-42b9-a2c0-233442395f16", "control-id": "pcidss_4_10-2.1.5", "description": "No notes for control-id 10.2.1.5.", "props": [ @@ -18055,7 +18009,7 @@ ] }, { - "uuid": "f142316e-0563-40a9-85f9-cfcdab9ff842", + "uuid": "d208d493-0660-4684-b329-adcc326f301d", "control-id": "pcidss_4_10-2.1.6", "description": "The description for control-id pcidss_4_10-2.1.6.", "props": [ @@ -18068,7 +18022,7 @@ ] }, { - "uuid": "b0b7cdc2-7364-4043-acc7-bf90d1c3fac0", + "uuid": "5c16e2e2-76fc-439b-b51b-7680740d093c", "control-id": "pcidss_4_10-2.1.7", "description": "There are enough rules to capture deletion events but not for creation events.\nThis requirement needs to be better investigated to confirm which additional rules would\nsatistfy the requirement.", "props": [ @@ -18115,7 +18069,7 @@ ] }, { - "uuid": "fd6dd3b9-a18a-4763-9bc6-f3ab9f60421f", + "uuid": "0646a436-f1f5-4e26-a9c1-0259fd89c902", "control-id": "pcidss_4_10-2.2", "description": "Standard settings for audit should be enough.", "props": [ @@ -18132,7 +18086,7 @@ ] }, { - "uuid": "7cd5aec4-78fc-4ce8-b597-7494f94b5c76", + "uuid": "02db8bd7-8752-43ae-822b-3b79ec645109", "control-id": "pcidss_4_10-3.1", "description": "No notes for control-id 10.3.1.", "props": [ @@ -18159,7 +18113,7 @@ ] }, { - "uuid": "226e7a47-3ebc-4f0b-8364-9f7db4985fe4", + "uuid": "b5e790d2-3cc3-4042-9d98-a5a3f3833625", "control-id": "pcidss_4_10-3.2", "description": "No notes for control-id 10.3.2.", "props": [ @@ -18196,7 +18150,7 @@ ] }, { - "uuid": "f12c6a12-ff82-46ba-a61b-49227de6f43b", + "uuid": "2b69abdf-8a1c-4fe1-8f4b-355da2459ade", "control-id": "pcidss_4_10-3.3", "description": "Although the technologies in general allow to send logs to a centralized server, some\nparameters for this configuration are specific to each site policy and therefore the\nrequirement demands manual assessment.", "props": [ @@ -18218,7 +18172,7 @@ ] }, { - "uuid": "c5da10f5-e495-4af2-a21f-d56c4ef54097", + "uuid": "5be43093-85a3-45ec-9d5f-890508ec4825", "control-id": "pcidss_4_10-3.4", "description": "No notes for control-id 10.3.4.", "props": [ @@ -18310,7 +18264,7 @@ ] }, { - "uuid": "c62fac83-71a6-4174-b2d0-89d2efc89089", + "uuid": "b56be24c-9e76-4687-b845-56175e14fb9d", "control-id": "pcidss_4_10-4.1.1", "description": "The description for control-id pcidss_4_10-4.1.1.", "props": [ @@ -18323,7 +18277,7 @@ ] }, { - "uuid": "30d35f80-ac5c-4168-8565-7b2ca8d58aa3", + "uuid": "c8ac4a29-7ea2-4ed4-9288-2df4d7a2772f", "control-id": "pcidss_4_10-4.2.1", "description": "The description for control-id pcidss_4_10-4.2.1.", "props": [ @@ -18336,7 +18290,7 @@ ] }, { - "uuid": "7bb993fd-71a3-4e7b-9099-f91467ab2950", + "uuid": "5529abff-b594-41ec-a85c-35a03d347190", "control-id": "pcidss_4_10-4.3", "description": "The description for control-id pcidss_4_10-4.3.", "props": [ @@ -18349,7 +18303,7 @@ ] }, { - "uuid": "f7ef0b45-caac-420e-b638-5ab9569d49a0", + "uuid": "349c1b04-f292-4c12-a485-c6a1c6dbc58c", "control-id": "pcidss_4_10-5.1", "description": "It is not simple to ensure 12 months history is present in each system but the rules in\nthis requirement ensures the logs are not lost without administrators awareness.", "props": [ @@ -18386,7 +18340,7 @@ ] }, { - "uuid": "e4f50991-5e66-47c4-be71-620daf65449d", + "uuid": "80003546-1209-4f88-a37a-08106b92891e", "control-id": "pcidss_4_10-6.1", "description": "Maybe it is possible to optmize some similar rules related to ntp.", "props": [ @@ -18403,7 +18357,7 @@ ] }, { - "uuid": "43f0a294-5181-4417-993a-b5c91c2919f2", + "uuid": "9aa3dbae-37ae-4061-adf5-79edf3556cb1", "control-id": "pcidss_4_10-6.2", "description": "The selected rules might need updates in order to restrict their platform applicability\nto avoid conflicts.", "props": [ @@ -18420,7 +18374,7 @@ ] }, { - "uuid": "3ef64294-7c7d-4a1f-9266-81c870e77b99", + "uuid": "6d323ec1-cc67-4b0c-ab7e-6a8129d06324", "control-id": "pcidss_4_10-6.3", "description": "No notes for control-id 10.6.3.", "props": [ @@ -18462,7 +18416,7 @@ ] }, { - "uuid": "c07d9d79-eec9-4ad2-8e89-d86f5e90aa81", + "uuid": "4da1bd69-080b-455e-bb87-3f71cf96f8a3", "control-id": "pcidss_4_10-7.1", "description": "The description for control-id pcidss_4_10-7.1.", "props": [ @@ -18475,7 +18429,7 @@ ] }, { - "uuid": "19dca3aa-bdcd-4f93-bbd7-39c939af56bd", + "uuid": "9c8772d1-a763-4226-a8f5-651f4e17316d", "control-id": "pcidss_4_10-7.2", "description": "No notes for control-id 10.7.2.", "props": [ @@ -18497,7 +18451,7 @@ ] }, { - "uuid": "8e23a978-015e-435a-90df-9ab58875100d", + "uuid": "8bcf2ec8-76ca-404f-b6f4-4683079a4d81", "control-id": "pcidss_4_10-7.3", "description": "The description for control-id pcidss_4_10-7.3.", "props": [ @@ -18510,7 +18464,7 @@ ] }, { - "uuid": "4262aeaf-e80e-4308-ad6a-76941b993743", + "uuid": "4514c797-1824-4c67-beb4-e02e5ffabe37", "control-id": "pcidss_4_11-1.1", "description": "The description for control-id pcidss_4_11-1.1.", "props": [ @@ -18523,7 +18477,7 @@ ] }, { - "uuid": "f8861f27-e9fd-4f7a-85e3-830a871ea279", + "uuid": "8c2e321f-7b55-4734-9166-9fb8b0b822b2", "control-id": "pcidss_4_11-1.2", "description": "The description for control-id pcidss_4_11-1.2.", "props": [ @@ -18536,7 +18490,7 @@ ] }, { - "uuid": "9d71b785-55c0-4a2c-849a-ed95954a4b08", + "uuid": "46c50c4c-0620-41b0-b81a-437fc3a9560a", "control-id": "pcidss_4_11-2.1", "description": "The description for control-id pcidss_4_11-2.1.", "props": [ @@ -18549,7 +18503,7 @@ ] }, { - "uuid": "ef22e120-2e7e-4211-8e59-3b05ade00a21", + "uuid": "d6bda89e-c231-418a-a7d5-1df9bc6e26dc", "control-id": "pcidss_4_11-2.2", "description": "The description for control-id pcidss_4_11-2.2.", "props": [ @@ -18562,7 +18516,7 @@ ] }, { - "uuid": "66e5de8b-3bf2-4016-aaf3-26d37f53ff4f", + "uuid": "2453d9f5-bbbf-47dd-815d-599eb084d98e", "control-id": "pcidss_4_11-3.1.1", "description": "The description for control-id pcidss_4_11-3.1.1.", "props": [ @@ -18575,7 +18529,7 @@ ] }, { - "uuid": "f7cd55df-d651-4d47-b024-c95aa4915c2b", + "uuid": "1472cb43-07f4-47f3-b77d-f07230fc9724", "control-id": "pcidss_4_11-3.1.2", "description": "The description for control-id pcidss_4_11-3.1.2.", "props": [ @@ -18588,7 +18542,7 @@ ] }, { - "uuid": "e929c4c7-e0f1-4d9c-bbd7-e754aa580447", + "uuid": "a80bf58a-03ef-4c9f-a550-bc4469ca360d", "control-id": "pcidss_4_11-3.1.3", "description": "The description for control-id pcidss_4_11-3.1.3.", "props": [ @@ -18601,7 +18555,7 @@ ] }, { - "uuid": "1032e1a4-3650-48fa-99ee-4e6d444a27ce", + "uuid": "4858cf98-f3af-4195-9681-f9c118d2e69e", "control-id": "pcidss_4_11-3.2.1", "description": "The description for control-id pcidss_4_11-3.2.1.", "props": [ @@ -18614,7 +18568,7 @@ ] }, { - "uuid": "07f0f173-65d1-4db8-9380-3ebc5ef8908f", + "uuid": "9bd74c30-46da-4766-8f90-9a220768b9bc", "control-id": "pcidss_4_11-4.1", "description": "The description for control-id pcidss_4_11-4.1.", "props": [ @@ -18627,7 +18581,7 @@ ] }, { - "uuid": "cbaa8119-eaf7-43b2-b93c-a9baaee06dab", + "uuid": "3f8d7df9-9922-412a-b097-1e2859b696b7", "control-id": "pcidss_4_11-4.2", "description": "The description for control-id pcidss_4_11-4.2.", "props": [ @@ -18640,7 +18594,7 @@ ] }, { - "uuid": "07ca94eb-138f-49c2-806c-225d45fe46e0", + "uuid": "381bc839-7be6-4ff9-98aa-cc3662227350", "control-id": "pcidss_4_11-4.3", "description": "The description for control-id pcidss_4_11-4.3.", "props": [ @@ -18653,7 +18607,7 @@ ] }, { - "uuid": "73f5744d-7f7b-4dd6-95ee-3c732a433b9a", + "uuid": "6d83744a-47cf-42c3-b77d-6aafbb32c67f", "control-id": "pcidss_4_11-4.4", "description": "The description for control-id pcidss_4_11-4.4.", "props": [ @@ -18666,7 +18620,7 @@ ] }, { - "uuid": "251e4872-2307-447e-93c7-fd86c94647c8", + "uuid": "9a1fa670-5765-411a-b3ea-88d168667ed2", "control-id": "pcidss_4_11-4.5", "description": "The description for control-id pcidss_4_11-4.5.", "props": [ @@ -18679,7 +18633,7 @@ ] }, { - "uuid": "29dc6610-a009-4f78-a0b3-cb1228a279e7", + "uuid": "f4d28001-c15a-498c-afc8-be2bfea4bf7e", "control-id": "pcidss_4_11-4.6", "description": "The description for control-id pcidss_4_11-4.6.", "props": [ @@ -18692,7 +18646,7 @@ ] }, { - "uuid": "2f59f966-4189-4095-9404-be07138bc851", + "uuid": "d4b28314-760d-4f83-b6f5-d5e01dd4bdc6", "control-id": "pcidss_4_11-4.7", "description": "The description for control-id pcidss_4_11-4.7.", "props": [ @@ -18705,7 +18659,7 @@ ] }, { - "uuid": "5a7f4469-8852-4f05-866d-73bd085cd7d8", + "uuid": "1891b8b6-3ad6-4a0f-b4a9-78922507e3e8", "control-id": "pcidss_4_11-5.1.1", "description": "The description for control-id pcidss_4_11-5.1.1.", "props": [ @@ -18718,7 +18672,7 @@ ] }, { - "uuid": "90b2b330-3e08-4188-91e8-ebd035763002", + "uuid": "af3c5e4a-947a-4898-a3ff-59de8cb2fd35", "control-id": "pcidss_4_11-5.2", "description": "No notes for control-id 11.5.2.", "props": [ @@ -18755,7 +18709,7 @@ ] }, { - "uuid": "f29f57e1-bf8e-474f-ad31-6318aa4286d1", + "uuid": "34d13359-6e29-4f30-8cb2-6e4156260a1b", "control-id": "pcidss_4_11-6.1", "description": "The description for control-id pcidss_4_11-6.1.", "props": [ @@ -18768,7 +18722,7 @@ ] }, { - "uuid": "c8b94bf4-f034-47a8-8185-c2fbf9a142cf", + "uuid": "9c82f317-a489-4ded-a3d9-37a700b5ac7d", "control-id": "pcidss_4_12-1.1", "description": "The description for control-id pcidss_4_12-1.1.", "props": [ @@ -18781,7 +18735,7 @@ ] }, { - "uuid": "fd21d72e-88de-4515-a042-1112269299fd", + "uuid": "0bed1459-9459-48ab-9dec-9c8c5ff0627d", "control-id": "pcidss_4_12-1.2", "description": "The description for control-id pcidss_4_12-1.2.", "props": [ @@ -18794,7 +18748,7 @@ ] }, { - "uuid": "40698f43-5c0d-4bd3-8c23-427f3c661a47", + "uuid": "da627df3-87b9-4485-af37-57f1bcba0177", "control-id": "pcidss_4_12-1.3", "description": "The description for control-id pcidss_4_12-1.3.", "props": [ @@ -18807,7 +18761,7 @@ ] }, { - "uuid": "c89c74fb-8397-4c04-837d-033be69a6bd3", + "uuid": "5267dada-61e8-496f-9809-faa29563aeee", "control-id": "pcidss_4_12-1.4", "description": "The description for control-id pcidss_4_12-1.4.", "props": [ @@ -18820,7 +18774,7 @@ ] }, { - "uuid": "1d850774-1d49-4192-8ddb-72626e7c50ce", + "uuid": "fdf55c17-16b4-425e-8ef3-8c7028f0f5e0", "control-id": "pcidss_4_12-2.1", "description": "The description for control-id pcidss_4_12-2.1.", "props": [ @@ -18833,7 +18787,7 @@ ] }, { - "uuid": "9a70d04a-365f-4d37-a195-57fa0b0e0b3c", + "uuid": "ba4e8b1c-3166-466d-87a5-cbb9bc18e1af", "control-id": "pcidss_4_12-3.1", "description": "The description for control-id pcidss_4_12-3.1.", "props": [ @@ -18846,7 +18800,7 @@ ] }, { - "uuid": "279332b1-5404-4de0-8d82-853b1e1bfb10", + "uuid": "a991f041-a718-4043-9b12-e10af83c1413", "control-id": "pcidss_4_12-3.2", "description": "The description for control-id pcidss_4_12-3.2.", "props": [ @@ -18859,7 +18813,7 @@ ] }, { - "uuid": "48edb6a1-b1f8-4423-82f8-3da3a8542392", + "uuid": "9d9549cc-60fc-43b2-a424-4cf364dd356e", "control-id": "pcidss_4_12-3.3", "description": "The description for control-id pcidss_4_12-3.3.", "props": [ @@ -18872,7 +18826,7 @@ ] }, { - "uuid": "8a97f9bc-84aa-4f54-9c0b-ced2840c8ed6", + "uuid": "f01b9564-4a32-4931-a913-7fa9d25e360f", "control-id": "pcidss_4_12-3.4", "description": "The description for control-id pcidss_4_12-3.4.", "props": [ @@ -18885,7 +18839,7 @@ ] }, { - "uuid": "839b204e-fe56-4a08-8eba-fca49d56ee72", + "uuid": "53f65ddd-e6a7-4819-8125-865de54f352a", "control-id": "pcidss_4_12-4.1", "description": "The description for control-id pcidss_4_12-4.1.", "props": [ @@ -18898,7 +18852,7 @@ ] }, { - "uuid": "42d2fd95-05e2-4f61-8f51-2a3f5b594d05", + "uuid": "eb4db063-dcc7-47d1-822e-569eb64d1d38", "control-id": "pcidss_4_12-4.2.1", "description": "The description for control-id pcidss_4_12-4.2.1.", "props": [ @@ -18911,7 +18865,7 @@ ] }, { - "uuid": "cd6e972a-06b9-48a3-9686-9e70cb8dcb4c", + "uuid": "93690263-fcdb-42a2-bcc2-441d9fbb934b", "control-id": "pcidss_4_12-5.1", "description": "The description for control-id pcidss_4_12-5.1.", "props": [ @@ -18924,7 +18878,7 @@ ] }, { - "uuid": "864f9682-7f43-4688-aed8-96a299975c73", + "uuid": "e85ce941-a08b-4f52-b5df-ba70cd08516a", "control-id": "pcidss_4_12-5.2.1", "description": "The description for control-id pcidss_4_12-5.2.1.", "props": [ @@ -18937,7 +18891,7 @@ ] }, { - "uuid": "b47aa4d8-c019-42f1-9ce9-1ebd06ab538c", + "uuid": "dbc6f8e0-80e5-4b77-9fb5-cf51c4240a07", "control-id": "pcidss_4_12-5.3", "description": "The description for control-id pcidss_4_12-5.3.", "props": [ @@ -18950,7 +18904,7 @@ ] }, { - "uuid": "4d1f54ca-b1f6-44fa-a06d-f7ba8e171172", + "uuid": "93985ab5-c49e-4fcd-8051-f97f9eda853e", "control-id": "pcidss_4_12-6.1", "description": "The description for control-id pcidss_4_12-6.1.", "props": [ @@ -18963,7 +18917,7 @@ ] }, { - "uuid": "b42cae82-1145-4f8f-9351-7c9770553285", + "uuid": "b0bf9dfc-9e4d-44d0-8257-d7f5a82bd388", "control-id": "pcidss_4_12-6.2", "description": "The description for control-id pcidss_4_12-6.2.", "props": [ @@ -18976,7 +18930,7 @@ ] }, { - "uuid": "addd101c-cba9-4f09-af68-79b2544182fc", + "uuid": "a0ce4ebd-260e-4700-ad5a-35d7fc8bfb77", "control-id": "pcidss_4_12-6.3.1", "description": "The description for control-id pcidss_4_12-6.3.1.", "props": [ @@ -18989,7 +18943,7 @@ ] }, { - "uuid": "b9915085-536c-44e2-9528-a7b9333f5cde", + "uuid": "352cfdd4-3991-4465-bb09-4f02a40430f7", "control-id": "pcidss_4_12-6.3.2", "description": "The description for control-id pcidss_4_12-6.3.2.", "props": [ @@ -19002,7 +18956,7 @@ ] }, { - "uuid": "162f111c-3244-4158-a386-d88436815c25", + "uuid": "8810e8d7-a1d5-44d5-a9ec-9fb252f34d55", "control-id": "pcidss_4_12-7.1", "description": "The description for control-id pcidss_4_12-7.1.", "props": [ @@ -19015,7 +18969,7 @@ ] }, { - "uuid": "ea82bb7f-cd82-4270-a100-59799bce8204", + "uuid": "e376f4d2-b1c2-474a-b678-b5711672770d", "control-id": "pcidss_4_12-8.1", "description": "The description for control-id pcidss_4_12-8.1.", "props": [ @@ -19028,7 +18982,7 @@ ] }, { - "uuid": "e587a8c2-6baa-4354-811d-c892f66b9d0b", + "uuid": "ff3641a0-bf1c-4a3a-8a4a-1bda55f24cc3", "control-id": "pcidss_4_12-8.2", "description": "The description for control-id pcidss_4_12-8.2.", "props": [ @@ -19041,7 +18995,7 @@ ] }, { - "uuid": "796da077-cbd3-4fb1-9537-e109c990e4e4", + "uuid": "18b3113a-1c4f-454c-a535-74b3d62c36ce", "control-id": "pcidss_4_12-8.3", "description": "The description for control-id pcidss_4_12-8.3.", "props": [ @@ -19054,7 +19008,7 @@ ] }, { - "uuid": "eeb20e08-11f7-4079-a898-6ba9aca9fc93", + "uuid": "2506852b-bf1d-4590-8b78-ea89107add8e", "control-id": "pcidss_4_12-8.4", "description": "The description for control-id pcidss_4_12-8.4.", "props": [ @@ -19067,7 +19021,7 @@ ] }, { - "uuid": "00fd78f8-4e81-4251-bc5d-c363b99f90ca", + "uuid": "f3103545-7b44-43a4-87a8-5999225fd490", "control-id": "pcidss_4_12-8.5", "description": "The description for control-id pcidss_4_12-8.5.", "props": [ @@ -19080,7 +19034,7 @@ ] }, { - "uuid": "3ac8f696-2902-4cf9-817f-ef5fb8b22589", + "uuid": "8802cb4b-20df-4018-a570-510b4edb7b70", "control-id": "pcidss_4_12-9.1", "description": "The description for control-id pcidss_4_12-9.1.", "props": [ @@ -19093,7 +19047,7 @@ ] }, { - "uuid": "b4a2be92-c196-4a6f-ae40-7382b6092fe2", + "uuid": "5de57683-b823-4891-948b-1e9a1fe5a5c6", "control-id": "pcidss_4_12-9.2", "description": "The description for control-id pcidss_4_12-9.2.", "props": [ @@ -19106,7 +19060,7 @@ ] }, { - "uuid": "210e883c-f79a-4340-8f18-f2ca03524aea", + "uuid": "94e04261-e0b6-4a2b-87fb-07622ee5da8d", "control-id": "pcidss_4_12-10.1", "description": "The description for control-id pcidss_4_12-10.1.", "props": [ @@ -19119,7 +19073,7 @@ ] }, { - "uuid": "b585e1e0-bf6c-4f53-8983-a1af6183ac80", + "uuid": "c9506a4d-eecd-43a0-b053-afcb1ff31399", "control-id": "pcidss_4_12-10.2", "description": "The description for control-id pcidss_4_12-10.2.", "props": [ @@ -19132,7 +19086,7 @@ ] }, { - "uuid": "712d2511-d4da-43da-94f8-3f5c99417bba", + "uuid": "3c538c38-1767-4ec9-8b15-28cff16aca76", "control-id": "pcidss_4_12-10.3", "description": "The description for control-id pcidss_4_12-10.3.", "props": [ @@ -19145,7 +19099,7 @@ ] }, { - "uuid": "f24ffbdf-4513-4f36-ac36-5ee96157cc90", + "uuid": "ff1a3544-36db-4f13-ab79-efe19cac3f28", "control-id": "pcidss_4_12-10.4.1", "description": "The description for control-id pcidss_4_12-10.4.1.", "props": [ @@ -19158,7 +19112,7 @@ ] }, { - "uuid": "fd9e69a7-7f04-48f2-ae8e-19442b530890", + "uuid": "162b90e5-cbc9-4f81-a554-1a087f75eb2d", "control-id": "pcidss_4_12-10.5", "description": "The description for control-id pcidss_4_12-10.5.", "props": [ @@ -19171,7 +19125,7 @@ ] }, { - "uuid": "e6b49ca7-290a-44cf-bc74-a129065d4941", + "uuid": "167d0a4c-3888-429f-9e00-cef3324adc12", "control-id": "pcidss_4_12-10.6", "description": "The description for control-id pcidss_4_12-10.6.", "props": [ @@ -19184,7 +19138,7 @@ ] }, { - "uuid": "47e08e56-4682-4ad7-a438-cc2440dd77e0", + "uuid": "58e9ec92-e719-48ae-8e08-a36a531a56c0", "control-id": "pcidss_4_12-10.7", "description": "The description for control-id pcidss_4_12-10.7.", "props": [ @@ -19197,7 +19151,7 @@ ] }, { - "uuid": "4511bb85-f01d-4121-a4f5-12af031e557d", + "uuid": "30c6e381-59bf-4d90-9db1-52eb5d0687e8", "control-id": "a1-1.1", "description": "The description for control-id a1-1.1.", "props": [ @@ -19210,7 +19164,7 @@ ] }, { - "uuid": "9fedc4dc-9318-4e6b-b869-cfe77ccf6582", + "uuid": "e540e740-75f1-45d8-ab26-3cf657df8ac0", "control-id": "a1-1.2", "description": "The description for control-id a1-1.2.", "props": [ @@ -19223,7 +19177,7 @@ ] }, { - "uuid": "5c425079-411f-4008-992e-a2dc4ee4c6fa", + "uuid": "87b076d4-91a2-4d49-bc71-0a42f3d3afde", "control-id": "a1-1.3", "description": "The description for control-id a1-1.3.", "props": [ @@ -19236,7 +19190,7 @@ ] }, { - "uuid": "53ffa5a9-7647-4f8c-a786-70675f68ab11", + "uuid": "5e70efc9-1a9a-45c1-a4e8-0d4c8da2dace", "control-id": "a1-1.4", "description": "The description for control-id a1-1.4.", "props": [ @@ -19249,7 +19203,7 @@ ] }, { - "uuid": "13a65a27-e20b-450e-95be-112a60aaf448", + "uuid": "c65c2831-2c01-49df-b92f-47677d1066e2", "control-id": "a1-2.1", "description": "The description for control-id a1-2.1.", "props": [ @@ -19262,7 +19216,7 @@ ] }, { - "uuid": "72772d5f-92ab-4b85-8661-d7144d52a6ea", + "uuid": "1ca329e7-d76c-40a4-bc47-f0faea65b721", "control-id": "a1-2.2", "description": "The description for control-id a1-2.2.", "props": [ @@ -19275,7 +19229,7 @@ ] }, { - "uuid": "c7529b54-93a8-4fcf-bc70-1ce7171695a4", + "uuid": "6b786f0f-0acf-4375-82da-90dbb146065a", "control-id": "a1-2.3", "description": "The description for control-id a1-2.3.", "props": [ @@ -19288,7 +19242,7 @@ ] }, { - "uuid": "570ffd45-8eb9-45b9-b6a4-944ff09ebfbc", + "uuid": "f1301c53-ad83-4c4f-9fec-c6a695be9238", "control-id": "a2-1.1", "description": "The description for control-id a2-1.1.", "props": [ @@ -19301,7 +19255,7 @@ ] }, { - "uuid": "afa02101-a6e8-459f-bdf6-88a0dabc1a74", + "uuid": "8124a806-fc4a-414c-8f2e-5b563cee0b35", "control-id": "a2-1.2", "description": "The description for control-id a2-1.2.", "props": [ @@ -19314,7 +19268,7 @@ ] }, { - "uuid": "c5ce7873-294b-4876-b60a-1deae4059331", + "uuid": "9c3d9271-46bb-451a-a285-e6d2c5a2864c", "control-id": "a2-1.3", "description": "The description for control-id a2-1.3.", "props": [ @@ -19327,7 +19281,7 @@ ] }, { - "uuid": "2ee02984-beec-4af6-a651-3e92f5e63552", + "uuid": "b4c3c2c7-b9f6-435f-aadc-6d4117efdd4f", "control-id": "a3-1.1", "description": "The description for control-id a3-1.1.", "props": [ @@ -19340,7 +19294,7 @@ ] }, { - "uuid": "6e86dd09-0d31-4a13-b852-a5ef8c72aaa1", + "uuid": "26559056-cb40-46c5-896b-78b057ba7a0b", "control-id": "a3-1.2", "description": "The description for control-id a3-1.2.", "props": [ @@ -19353,7 +19307,7 @@ ] }, { - "uuid": "3622635a-cf34-43cc-9014-609bc6263ae2", + "uuid": "7dbef143-8f6f-453a-bde5-afa065ff80ba", "control-id": "a3-1.3", "description": "The description for control-id a3-1.3.", "props": [ @@ -19366,7 +19320,7 @@ ] }, { - "uuid": "2e58d01c-ddbd-498b-8f2c-777a9ec76779", + "uuid": "abff96ad-e76b-464a-959f-10922efc4029", "control-id": "a3-1.4", "description": "The description for control-id a3-1.4.", "props": [ @@ -19379,7 +19333,7 @@ ] }, { - "uuid": "ba3cf32e-49c5-46bb-b150-b6e3921c6780", + "uuid": "907a8dc7-7d6a-4f81-b822-fe1d91449977", "control-id": "a3-2.1", "description": "The description for control-id a3-2.1.", "props": [ @@ -19392,7 +19346,7 @@ ] }, { - "uuid": "688df02a-150c-4c6b-a7b5-fc05c8927d85", + "uuid": "0600c027-fa0a-4a06-b19f-af2090b4dacb", "control-id": "a3-2.2.1", "description": "The description for control-id a3-2.2.1.", "props": [ @@ -19405,7 +19359,7 @@ ] }, { - "uuid": "2be3561b-4b9a-4997-a26b-4e9606183bd3", + "uuid": "918d7d4a-aed1-49a9-9859-60318861d9cb", "control-id": "a3-2.3", "description": "The description for control-id a3-2.3.", "props": [ @@ -19418,7 +19372,7 @@ ] }, { - "uuid": "bac5827b-e6b2-4151-a555-a00ee0c43a0f", + "uuid": "660185b9-8c15-4c90-8569-91208b295fa5", "control-id": "a3-2.4", "description": "The description for control-id a3-2.4.", "props": [ @@ -19431,7 +19385,7 @@ ] }, { - "uuid": "741420e2-8075-4246-9706-0c7cb6459599", + "uuid": "0abafd9e-fdef-471b-be0b-0a89ef8b1920", "control-id": "a3-2.5.1", "description": "The description for control-id a3-2.5.1.", "props": [ @@ -19444,7 +19398,7 @@ ] }, { - "uuid": "744fcdbc-8b16-42cc-9d19-e819a2bd6585", + "uuid": "132c7db5-da69-4ad2-9289-a59e3cc83ae8", "control-id": "a3-2.5.2", "description": "The description for control-id a3-2.5.2.", "props": [ @@ -19457,7 +19411,7 @@ ] }, { - "uuid": "f4b05953-bef4-41da-bce0-782455a1fec0", + "uuid": "9969607e-47e3-4a24-bad0-2cb860faab1b", "control-id": "a3-2.6.1", "description": "The description for control-id a3-2.6.1.", "props": [ @@ -19470,7 +19424,7 @@ ] }, { - "uuid": "013c1c9d-9b76-4f3d-b501-eb98607762d6", + "uuid": "6b2e662d-38d7-4566-ac5e-ac732f019c7c", "control-id": "a3-3.1.2", "description": "The description for control-id a3-3.1.2.", "props": [ @@ -19483,7 +19437,7 @@ ] }, { - "uuid": "ab2e016f-f666-4c6f-af9e-88ab9c2632d6", + "uuid": "20911aed-7b22-4ddd-ae4d-11c16999c2d5", "control-id": "a3-3.2", "description": "The description for control-id a3-3.2.", "props": [ @@ -19496,7 +19450,7 @@ ] }, { - "uuid": "3a76794e-3257-45d1-9c81-748c0b54b630", + "uuid": "81466d46-30ec-4677-9c03-0f10cfd13275", "control-id": "a3-3.3", "description": "The description for control-id a3-3.3.", "props": [ @@ -19509,7 +19463,7 @@ ] }, { - "uuid": "d0c98d01-0f70-4e09-ac22-e24313ad0f6f", + "uuid": "eb557efd-9b78-4672-9b45-0c28eb3ce6db", "control-id": "a3-4.1", "description": "The description for control-id a3-4.1.", "props": [ @@ -19522,7 +19476,7 @@ ] }, { - "uuid": "d20e2e28-8eb9-447f-89ae-1b8e1f02f0ec", + "uuid": "e6290c91-403d-49a3-9d8a-e8d497c69cfe", "control-id": "a3-5.1", "description": "The description for control-id a3-5.1.", "props": [ diff --git a/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json b/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json index 1eac2506d..f3ca18f05 100644 --- a/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json @@ -3,8 +3,8 @@ "uuid": "b295d181-e9e6-410c-96a5-120787697faf", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-01-05T17:18:41.416182+00:00", - "version": "2.1", + "last-modified": "2026-03-27T01:16:18.635977+00:00", + "version": "2.2", "oscal-version": "1.1.3" }, "components": [ @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -1091,7 +1091,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { @@ -7525,7 +7525,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7543,7 +7543,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8677,7 +8677,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { @@ -8689,7 +8689,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { diff --git a/component-definitions/rhel8/rhel8-anssi-high/component-definition.json b/component-definitions/rhel8/rhel8-anssi-high/component-definition.json index 72a945a5d..ba9855d0b 100644 --- a/component-definitions/rhel8/rhel8-anssi-high/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "ee3f4035-1eac-4bf9-afc2-08795f43524d", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-01-05T17:19:35.201797+00:00", - "version": "1.9", + "last-modified": "2026-03-27T01:17:15.782160+00:00", + "version": "2.0", "oscal-version": "1.1.3" }, "components": [ @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -1163,7 +1163,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { @@ -9193,7 +9193,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9211,7 +9211,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -10399,7 +10399,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { @@ -10411,7 +10411,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { diff --git a/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json b/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json index 1570fa455..1e924a519 100644 --- a/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json @@ -3,8 +3,8 @@ "uuid": "64e51a15-1ac4-48f3-84c6-aa4b5ad14f72", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-01-05T17:20:20.178244+00:00", - "version": "1.9", + "last-modified": "2026-03-27T01:18:04.545569+00:00", + "version": "2.0", "oscal-version": "1.1.3" }, "components": [ @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -1037,7 +1037,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { @@ -5686,7 +5686,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -5704,7 +5704,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -6802,7 +6802,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { @@ -6814,7 +6814,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_035" }, { diff --git a/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json b/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json index 554f94172..98f54ae96 100644 --- a/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json @@ -3,8 +3,8 @@ "uuid": "dca4a913-7a66-4798-b587-254db2359b9b", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-01-05T17:20:55.670557+00:00", - "version": "1.7", + "last-modified": "2026-03-27T01:18:42.052816+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -149,7 +149,7 @@ { "name": "Parameter_Value_Alternatives_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -749,7 +749,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_35" }, { @@ -1467,7 +1467,7 @@ { "name": "Parameter_Value_Alternatives_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -1485,7 +1485,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -2475,7 +2475,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_35" }, { @@ -2487,7 +2487,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_35" }, { diff --git a/component-definitions/rhel8/rhel8-e8-base/component-definition.json b/component-definitions/rhel8/rhel8-e8-base/component-definition.json index 75d6b9380..7edf03fc4 100644 --- a/component-definitions/rhel8/rhel8-e8-base/component-definition.json +++ b/component-definitions/rhel8/rhel8-e8-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "13a8f69b-b17f-4dc8-b644-faf62dcc5038", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-03-17T09:21:52.101378+00:00", - "version": "1.6", + "last-modified": "2026-03-27T01:46:14.107047+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -1241,7 +1241,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -4232,7 +4232,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -4244,7 +4244,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { diff --git a/component-definitions/rhel8/rhel8-hipaa-addressable/component-definition.json b/component-definitions/rhel8/rhel8-hipaa-addressable/component-definition.json index 3a34483a0..4e80750f8 100644 --- a/component-definitions/rhel8/rhel8-hipaa-addressable/component-definition.json +++ b/component-definitions/rhel8/rhel8-hipaa-addressable/component-definition.json @@ -3,8 +3,8 @@ "uuid": "194fbd4c-a704-4d37-9717-118edd4d6fbc", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-09-26T11:52:44.752335+08:00", - "version": "1.3", + "last-modified": "2026-03-27T01:20:09.929079+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -1463,7 +1463,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { @@ -14692,7 +14692,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { @@ -14704,7 +14704,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { diff --git a/component-definitions/rhel8/rhel8-hipaa-base/component-definition.json b/component-definitions/rhel8/rhel8-hipaa-base/component-definition.json index 8e238a5ec..48677e766 100644 --- a/component-definitions/rhel8/rhel8-hipaa-base/component-definition.json +++ b/component-definitions/rhel8/rhel8-hipaa-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "9e980597-3d4e-4a55-b333-88c6ea54bc5e", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-09-26T11:53:33.581205+08:00", - "version": "1.3", + "last-modified": "2026-03-27T01:20:52.885697+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -1463,7 +1463,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { @@ -12904,7 +12904,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { @@ -12916,7 +12916,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { diff --git a/component-definitions/rhel8/rhel8-hipaa-required/component-definition.json b/component-definitions/rhel8/rhel8-hipaa-required/component-definition.json index 2053c61b4..45e7123a6 100644 --- a/component-definitions/rhel8/rhel8-hipaa-required/component-definition.json +++ b/component-definitions/rhel8/rhel8-hipaa-required/component-definition.json @@ -3,8 +3,8 @@ "uuid": "c5cc9eb3-225d-42d4-a67f-e5a969cae713", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-09-26T11:51:56.589817+08:00", - "version": "1.5", + "last-modified": "2026-03-27T01:19:27.231201+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -1463,7 +1463,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { @@ -16279,7 +16279,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { @@ -16291,7 +16291,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_111" }, { diff --git a/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json b/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json index 6cf1ab0c6..f9d92293c 100644 --- a/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json +++ b/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "a2008f82-e4ed-407a-bef6-183adc890d41", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-03-19T13:59:18.184539+00:00", - "version": "2.1", + "last-modified": "2026-03-27T01:21:36.676204+00:00", + "version": "2.2", "oscal-version": "1.1.3" }, "components": [ @@ -1367,7 +1367,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -9286,7 +9286,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -9298,7 +9298,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { diff --git a/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json b/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json index b53d21cc9..d2fab2c74 100644 --- a/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json +++ b/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "94022509-931e-45be-8b82-07d701b58383", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-03-19T13:59:57.855736+00:00", - "version": "1.9", + "last-modified": "2026-03-27T01:22:19.827556+00:00", + "version": "2.0", "oscal-version": "1.1.3" }, "components": [ @@ -1367,7 +1367,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -9534,7 +9534,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -9546,7 +9546,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { diff --git a/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json b/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json index bfbed8088..fd5b82dba 100644 --- a/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json +++ b/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "58dcf5ea-6e5f-45eb-ab43-a97553d39619", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-03-19T14:00:38.013200+00:00", - "version": "1.9", + "last-modified": "2026-03-27T01:23:02.740774+00:00", + "version": "2.0", "oscal-version": "1.1.3" }, "components": [ @@ -1367,7 +1367,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -9658,7 +9658,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { @@ -9670,7 +9670,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_094" }, { diff --git a/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json b/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json index 419eea3f4..e91240943 100644 --- a/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json +++ b/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "086b160b-e979-4e7f-ab46-a2f7c88b7bdd", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2026-01-05T17:23:42.738780+00:00", - "version": "2.5", + "last-modified": "2026-03-27T01:23:52.173198+00:00", + "version": "2.6", "oscal-version": "1.1.3" }, "components": [ @@ -311,7 +311,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -1109,7 +1109,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_044" }, { @@ -8695,7 +8695,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8713,7 +8713,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8785,7 +8785,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -10009,7 +10009,7 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_044" }, { @@ -10021,7 +10021,7 @@ { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall xinetd Package", + "value": "Uninstall xinetd package if not used by network services", "remarks": "rule_set_044" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json b/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json index 1e93a0344..894cead71 100644 --- a/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json @@ -3,8 +3,8 @@ "uuid": "fb4d7f88-deb5-45ad-a88a-f90300331665", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2026-01-05T17:24:31.904856+00:00", - "version": "1.6", + "last-modified": "2026-03-27T01:24:44.426403+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7278,7 +7278,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7296,7 +7296,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-high/component-definition.json b/component-definitions/rhel9/rhel9-anssi-high/component-definition.json index 4b4e33cb4..9450aa940 100644 --- a/component-definitions/rhel9/rhel9-anssi-high/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "ba234c1c-cc49-4b41-a997-69fd477a45fd", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2026-01-05T17:25:24.163650+00:00", - "version": "1.6", + "last-modified": "2026-03-27T01:25:39.678492+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9014,7 +9014,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9032,7 +9032,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json b/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json index 05c4bf2be..dea8625d5 100644 --- a/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json @@ -3,8 +3,8 @@ "uuid": "08306d16-4996-4b5d-bbf3-1800c9877ae1", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2026-01-05T17:26:08.398380+00:00", - "version": "1.6", + "last-modified": "2026-03-27T01:26:26.558192+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -5558,7 +5558,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -5576,7 +5576,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json b/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json index 56c6d1c84..0658e82ba 100644 --- a/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json @@ -3,8 +3,8 @@ "uuid": "5e2a14d9-cdc9-4476-b4c5-04ab3a945548", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2026-01-05T17:26:43.166393+00:00", - "version": "1.6", + "last-modified": "2026-03-27T01:27:03.806627+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -185,7 +185,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -1458,7 +1458,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -1476,7 +1476,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { diff --git a/component-definitions/rhel9/rhel9-hipaa-addressable/component-definition.json b/component-definitions/rhel9/rhel9-hipaa-addressable/component-definition.json index d2d4496cb..2624b62cd 100644 --- a/component-definitions/rhel9/rhel9-hipaa-addressable/component-definition.json +++ b/component-definitions/rhel9/rhel9-hipaa-addressable/component-definition.json @@ -3,8 +3,8 @@ "uuid": "99dd9ff2-2bdf-4ac9-9b36-d43e6591b334", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-09-26T16:25:18.659561+08:00", - "version": "1.2", + "last-modified": "2026-03-27T01:28:33.244899+00:00", + "version": "1.3", "oscal-version": "1.1.3" }, "components": [ @@ -1658,46 +1658,34 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_127" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" } ], "control-implementations": [ { - "uuid": "67fc7c19-d587-47a0-9403-4297dc4c3344", + "uuid": "feec3baa-23b2-4710-b0ea-63ef0693d61f", "source": "trestle://profiles/rhel9-hipaa-addressable/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -1747,7 +1735,7 @@ ], "implemented-requirements": [ { - "uuid": "f8efbace-908e-4cab-bedb-81e792915cc8", + "uuid": "752257bb-29d7-43ad-b911-e008d2edd4db", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -1769,7 +1757,7 @@ ] }, { - "uuid": "d6a44c27-86d9-47b5-a1be-e0ea49d8924b", + "uuid": "d7476c90-647a-42c6-8348-dbb3ccca922f", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -1786,7 +1774,7 @@ ] }, { - "uuid": "3e5f6d3b-c016-4ce6-9652-834f72eb5100", + "uuid": "2b482ea5-2cfb-46b5-9405-d2c4a0f5be58", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -1863,7 +1851,7 @@ ] }, { - "uuid": "384c50e7-e160-416b-bfff-bd0f27058f3f", + "uuid": "441f068f-15d9-4be6-bd2d-c9d4c3c1da5d", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -1940,7 +1928,7 @@ ] }, { - "uuid": "d37924bd-32a4-4e13-bda6-2c4d979b528b", + "uuid": "38704183-6fa5-4aa7-9087-aa3491adaa99", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -2017,7 +2005,7 @@ ] }, { - "uuid": "3ad3b4cc-f5bf-4be0-beda-d80323b800ea", + "uuid": "e63727a3-f84b-442f-91fe-3303e7ad9fee", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -2249,7 +2237,7 @@ ] }, { - "uuid": "2e281aa5-ccf5-4466-8427-b3fe23595f4f", + "uuid": "e8d62479-3b72-4d7c-a34b-3850cff5e8cf", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -2351,7 +2339,7 @@ ] }, { - "uuid": "0298ce84-8d06-467c-8f5c-76b81d63ae50", + "uuid": "1d62de27-3652-4132-8916-fe34798b4dd3", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -2368,7 +2356,7 @@ ] }, { - "uuid": "a59ad588-c971-406e-bed3-a38cdd498ee9", + "uuid": "6eb24e1b-dce8-4345-b240-0ca106231285", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -2395,7 +2383,7 @@ ] }, { - "uuid": "0a32c43d-b0e8-442a-abff-d92eaf194e12", + "uuid": "409c2e79-1428-49f9-88b5-3b87cad15435", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -2437,7 +2425,7 @@ ] }, { - "uuid": "a6e3d666-ae22-4ffe-b735-632de80e614b", + "uuid": "f784a1c1-3926-4124-af0f-272de92ed22d", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -2479,7 +2467,7 @@ ] }, { - "uuid": "9d7cc44b-cc82-4a61-932f-dec912184c5a", + "uuid": "f0757ffa-ecfb-4769-8485-06544e0b2685", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -2587,16 +2575,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "22e9ead0-f731-4363-b914-a7f874456f3f", + "uuid": "1628e36e-7b0a-4788-a6a3-38552073a35a", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -2668,7 +2651,7 @@ ] }, { - "uuid": "09b0d709-bcef-49da-aeca-9586d180c2ca", + "uuid": "93edaf36-907f-4bbf-9c93-a745daadd02f", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -2740,7 +2723,7 @@ ] }, { - "uuid": "63e39c7b-118e-48ee-9a29-4e33a17b931b", + "uuid": "c206152e-917e-44c8-8f32-58b93359c676", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -2848,16 +2831,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "62fbcd8e-cb02-4281-9d85-856d08a8045f", + "uuid": "b1fa0f91-a755-44de-a4d4-d0812a4e8e7d", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -2879,7 +2857,7 @@ ] }, { - "uuid": "f44500da-beee-4211-a96e-3b52b3fb60b4", + "uuid": "3b1a691f-4d74-47d0-843a-3259c1831334", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -3256,7 +3234,7 @@ ] }, { - "uuid": "ed64526e-e22b-42ac-8f07-f092a8beb110", + "uuid": "ed20870f-7898-4950-ac87-8d849486e565", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -3333,7 +3311,7 @@ ] }, { - "uuid": "a261b520-63bd-4251-9aab-b58a9dd6df23", + "uuid": "efa72be7-2afc-40b0-be03-f26b30697a95", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -3355,7 +3333,7 @@ ] }, { - "uuid": "4cbd4e33-92fb-4e65-8988-42ac8839e80e", + "uuid": "c23aacd9-ed9d-4ebe-98c0-31eabb493fbb", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -3468,16 +3446,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "a452475d-3311-487c-9e31-cc41dc86d630", + "uuid": "a85174f9-f597-4167-bd7f-7d01036c8579", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -3489,7 +3462,7 @@ ] }, { - "uuid": "9c11795d-0cc1-499c-9501-fe02e1f5ae13", + "uuid": "748683fb-08ec-4374-a717-0c20225e5b2e", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -3566,7 +3539,7 @@ ] }, { - "uuid": "59da5c00-2dcc-4f09-9da2-aaaf69be26e5", + "uuid": "4eafcdb2-d2b0-4e69-bceb-5438bfc5d1aa", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -3593,7 +3566,7 @@ ] }, { - "uuid": "aae8387e-2c65-4a28-81b5-ab2a2760048a", + "uuid": "fc7b96c3-4421-414d-b868-10d6f341f48a", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -3730,7 +3703,7 @@ ] }, { - "uuid": "8be8d7a3-5ba5-4d0e-a74d-0dea91fa3586", + "uuid": "e919f381-5f86-4aa8-89c4-5b6a1bb5206b", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -3747,7 +3720,7 @@ ] }, { - "uuid": "aa4529b6-65af-4b93-94fb-0432878783da", + "uuid": "983f59ed-4a28-474c-8d71-6f4fa4e598cf", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -3834,7 +3807,7 @@ ] }, { - "uuid": "58dde271-50e1-4012-a1ad-b2f7f94ae5d6", + "uuid": "4830567e-dec8-4457-9eb9-769dfa96ea06", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -3856,7 +3829,7 @@ ] }, { - "uuid": "b2278fb9-af00-4341-81b0-9ca654f9d05e", + "uuid": "bad70af2-3832-41ba-a419-1a1bdce61a74", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -3933,7 +3906,7 @@ ] }, { - "uuid": "15ee07a1-ed3f-495c-93b0-30bdf8e47eab", + "uuid": "48b88957-eb64-4d97-8831-b0d99c565828", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -3960,7 +3933,7 @@ ] }, { - "uuid": "3b0da973-3415-42ec-bb32-2369a5e7ad49", + "uuid": "7ff5e6ac-4ace-4917-b396-1b44cfc5ac00", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -4382,7 +4355,7 @@ ] }, { - "uuid": "e0f111c6-9113-4835-9b72-0caf04d015b8", + "uuid": "94173724-ab85-43ce-a0bc-d11aa1a24f9a", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -4399,7 +4372,7 @@ ] }, { - "uuid": "8341a42e-6c7f-46db-ad1d-1223d35c388b", + "uuid": "098425cd-b7d3-4f21-a626-056d3e0b3142", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -4441,7 +4414,7 @@ ] }, { - "uuid": "44003baf-c11d-4445-aa39-763d941dba92", + "uuid": "a0569246-93f4-4c1b-9120-93c35e735e32", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -4803,7 +4776,7 @@ ] }, { - "uuid": "005a142f-a7bb-4a98-a810-84ad926853f8", + "uuid": "651e32df-f817-4fd9-ad6c-2898cba6ef63", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -5220,7 +5193,7 @@ ] }, { - "uuid": "5b489ddc-ad3d-4a3f-81ff-6792bc5a4588", + "uuid": "eeca736f-045f-4b85-b7d9-4edffdf9ded4", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -5328,16 +5301,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "51f14d8a-e63b-43df-918d-4348ad1b0305", + "uuid": "d9182749-7cd5-4baa-8b02-97a138fdf37d", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -5359,7 +5327,7 @@ ] }, { - "uuid": "384b54fa-ddf3-48b0-88be-6de4227b11a1", + "uuid": "c92365d0-0632-4c55-8281-da9e25a7d9f7", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -5376,7 +5344,7 @@ ] }, { - "uuid": "8843931d-fbb3-42ef-8c35-fa5b700fba19", + "uuid": "d39e5f01-2f15-4e96-8fac-f70a0d46018f", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -5453,7 +5421,7 @@ ] }, { - "uuid": "90ebe1d8-c345-406c-bd91-a7428f712fff", + "uuid": "4a715e09-e3f5-4b19-b500-903462eb4611", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -5530,7 +5498,7 @@ ] }, { - "uuid": "9e8135a3-3246-416a-b662-419570cb7110", + "uuid": "64c1aa4f-9b6f-4745-85bf-f7293aa69abc", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -5607,7 +5575,7 @@ ] }, { - "uuid": "6633fd4a-56b3-4381-a4a6-062d0c198af4", + "uuid": "5026aba0-1bd6-4d40-9e7d-9d25488cf603", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -5839,7 +5807,7 @@ ] }, { - "uuid": "deb8d916-cad0-428a-9033-6b0d49de4f7e", + "uuid": "88598344-7fab-411a-bb4e-8cd72ddd1b8f", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -5941,7 +5909,7 @@ ] }, { - "uuid": "8aa8b53e-d91d-4850-9bc6-55c0adf8105f", + "uuid": "d0d97bb3-2080-488f-95db-4e6fe8b4d9ed", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -5958,7 +5926,7 @@ ] }, { - "uuid": "0497cb52-3297-43e7-a62c-3dc3d6df5a49", + "uuid": "9dfea121-2c65-4a9b-845b-1cc6071ca5c9", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -5985,7 +5953,7 @@ ] }, { - "uuid": "75d5e671-dfd6-4b0d-837e-13d94c67a2ca", + "uuid": "c3513f79-c222-42d1-805a-08e6a8e14313", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -6027,7 +5995,7 @@ ] }, { - "uuid": "752b60a0-d406-41f7-b685-d4e8cdfa017c", + "uuid": "c4a75183-7b96-43d0-bafc-07f24f656a39", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -6069,7 +6037,7 @@ ] }, { - "uuid": "6c52046e-0015-4f48-818e-2d835b2d37ea", + "uuid": "514ab471-1cf0-463b-8099-c4b1660122e8", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -6177,16 +6145,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ab8dddd5-5cff-4e2d-8d8e-e464942e554b", + "uuid": "d69e4d2d-e582-4d41-8b2a-017a62ecab8e", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -6258,7 +6221,7 @@ ] }, { - "uuid": "f0e8a85a-7254-4ccd-a2d3-92ed49d2d612", + "uuid": "655d5f47-2cf2-42b2-ba25-88cf8195f90b", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -6330,7 +6293,7 @@ ] }, { - "uuid": "52481f89-a753-4443-9544-b72adf329ea1", + "uuid": "ea587d98-9a85-43e2-98c6-69f3e7a28a89", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -6438,16 +6401,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "61c84cfb-21fa-4f70-84df-ec07d07ae956", + "uuid": "fc28c1cb-220f-42c0-9056-0c86b1ed699f", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -6469,7 +6427,7 @@ ] }, { - "uuid": "be6b7073-fb12-4b73-a082-21a13339e46f", + "uuid": "9d8d1432-d10e-4bca-ab6f-795f2a0e914e", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -6846,7 +6804,7 @@ ] }, { - "uuid": "2c609cba-6b33-4c84-a2f5-17fe7f62e6d0", + "uuid": "faf71844-6e16-408d-87ce-baf54176cae3", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -6923,7 +6881,7 @@ ] }, { - "uuid": "dc4e0a7e-79e7-4c96-b687-92074973fced", + "uuid": "1dec27f7-6824-41b7-871c-8075b0b9b656", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -6945,7 +6903,7 @@ ] }, { - "uuid": "99acefc4-fa9f-4707-b4d4-07bca42bb96f", + "uuid": "58329c05-627a-4c4a-9517-8920f1c0b53d", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -7058,16 +7016,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "9ab210b0-7afe-469a-92c6-69a764fbcc7d", + "uuid": "ac77f1be-2999-43b5-b640-860a14eccdc5", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -7079,7 +7032,7 @@ ] }, { - "uuid": "476be333-01a1-46fd-abc0-acc90b39ac06", + "uuid": "04590415-bcac-4b6c-9e46-035adbee5834", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -7156,7 +7109,7 @@ ] }, { - "uuid": "2add7955-5d75-480a-a896-17f95ceb1cf2", + "uuid": "6db57f9a-32a1-47a2-a613-963a46c3d1a9", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -7183,7 +7136,7 @@ ] }, { - "uuid": "263cd492-5cd1-44b5-8e78-f1ea8b50649c", + "uuid": "4c321f17-8731-44af-b808-1e3cb1c8c1b4", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -7320,7 +7273,7 @@ ] }, { - "uuid": "77656008-46db-486c-ab80-8ecc3df9cc61", + "uuid": "555c31d9-490c-4ab2-aaca-cc1c69873233", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -7337,7 +7290,7 @@ ] }, { - "uuid": "135b6e72-530f-4482-a465-2b644a89ad3e", + "uuid": "4c202f06-4d36-4b98-9136-1d9a3a6c49fd", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -7424,7 +7377,7 @@ ] }, { - "uuid": "aa0a5a24-9719-4680-82f9-211720f8b9dd", + "uuid": "5990cffd-d5ee-4448-b6eb-db0ac9dd9c90", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -7446,7 +7399,7 @@ ] }, { - "uuid": "f34ddc84-82e5-48a4-8f9c-1523d49b0414", + "uuid": "1586089e-02c1-406b-8aa6-cde0a213036b", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -7523,7 +7476,7 @@ ] }, { - "uuid": "31591cdd-c03e-4a13-826a-9083eb53864b", + "uuid": "57515478-da81-4dee-9aa8-d5c9dc4e78bc", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -7550,7 +7503,7 @@ ] }, { - "uuid": "dc37b6f6-884a-4f99-866d-ac7113d1925c", + "uuid": "12c6e07c-7e5f-446e-b570-9c9de497a17a", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -7972,7 +7925,7 @@ ] }, { - "uuid": "ef820846-b28e-4311-bb26-64de2dedd2f6", + "uuid": "7a5bdd6e-5757-4f36-9fcc-f31653da3e5c", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -7989,7 +7942,7 @@ ] }, { - "uuid": "06a065a6-8f03-438b-bdff-a34ac0785443", + "uuid": "347b76a4-b834-47c6-92bd-f778791863c4", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -8031,7 +7984,7 @@ ] }, { - "uuid": "d97fae55-a62e-4e5a-a0f6-37b76be34154", + "uuid": "f0c5aefa-427c-4e42-ac9b-5edc28edd97e", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -8393,7 +8346,7 @@ ] }, { - "uuid": "0d4dfb82-8f82-4ea3-8387-af2a0641990c", + "uuid": "00db0d61-70e3-4d7f-b59c-dbeac5b94156", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -8810,7 +8763,7 @@ ] }, { - "uuid": "f448ecd9-8fa2-4d3e-ae93-43aa1a1eee7d", + "uuid": "855cdd72-44f2-4c3f-8725-0d117e979cca", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -8918,16 +8871,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "94ca2e5e-381b-4dd9-a2bf-c88b46c67c48", + "uuid": "6cdf977d-377d-44a1-a3fe-04be25f69592", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -8999,7 +8947,7 @@ ] }, { - "uuid": "43548d4d-9ce1-48e1-b30f-fc7e9e00f0ac", + "uuid": "7c706b8a-1448-4faf-b4aa-9f45f32eceab", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -9071,7 +9019,7 @@ ] }, { - "uuid": "5fbcad85-6029-4353-be71-a73fe889a65f", + "uuid": "34c9d05a-da6a-48b3-a4ee-d16c56251f3d", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -9179,16 +9127,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "f08f1b95-48c5-4073-be97-30358f56058b", + "uuid": "bc2700d4-16b0-4677-99c5-aec673f3da68", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -9210,7 +9153,7 @@ ] }, { - "uuid": "1c100e87-5544-405f-b1c4-acccdf900f2e", + "uuid": "c21d7f00-0828-494b-9104-a924bdd70c1e", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -9587,7 +9530,7 @@ ] }, { - "uuid": "bf328f4c-6e10-4e91-99d5-3a100f96405c", + "uuid": "fcbf857e-d865-477c-bff7-8ecd4d83b9e2", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -9664,7 +9607,7 @@ ] }, { - "uuid": "5e5826cd-817c-4214-b49c-c29fb5084b5b", + "uuid": "28f7d6b6-295b-4221-a0a8-62b97c4053d6", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -9686,7 +9629,7 @@ ] }, { - "uuid": "1aebbbb8-fa2a-40fc-8e8f-42bce0fb89ab", + "uuid": "d0fe9aed-b3ce-4bbc-9027-9393c4e01dd9", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -9799,16 +9742,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "e1385625-1603-49c1-99e9-ba2a86c73212", + "uuid": "9b02406c-39f3-4e2c-9e67-5f209445ffdb", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -9820,7 +9758,7 @@ ] }, { - "uuid": "29258361-ffea-4160-9c3f-a8cc10dce01a", + "uuid": "091856e5-48b1-4b51-885e-94097a3e6536", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -9897,7 +9835,7 @@ ] }, { - "uuid": "4f1e6fdf-09b9-4d3c-bb50-ae51637c990b", + "uuid": "587e39c2-21b2-4daf-b1c6-eab835ea4a76", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -9924,7 +9862,7 @@ ] }, { - "uuid": "901aa852-594d-47ad-bca4-879aa769b7b6", + "uuid": "2800514d-2624-49bf-bcf0-aafd0f8650eb", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -10061,7 +9999,7 @@ ] }, { - "uuid": "4bad72b5-27c6-40ed-a8b8-1a30eda980c2", + "uuid": "b82cb806-3f4d-4ef6-a679-fa38ba1688c0", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -10078,7 +10016,7 @@ ] }, { - "uuid": "76edba73-6753-4637-85e6-6f5d98d60619", + "uuid": "e2999c48-6ea8-4c5c-8209-85f2af500939", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -10165,7 +10103,7 @@ ] }, { - "uuid": "41b5394a-6dc1-46cc-a0bd-db183e1a6311", + "uuid": "ace3ce74-7237-4bed-8633-730246b22076", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -10187,7 +10125,7 @@ ] }, { - "uuid": "f8b72595-4bfe-4ac8-830a-28be3fad1e6f", + "uuid": "2187feb2-068f-4b08-ade1-e57c425c8fe9", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -10264,7 +10202,7 @@ ] }, { - "uuid": "1d203ade-2a95-42fe-afd3-aab0765a3c3a", + "uuid": "b0c8cd2f-9cd2-46a2-b119-05790caf2fc2", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -10291,7 +10229,7 @@ ] }, { - "uuid": "588bd21e-c8fb-4308-b2a4-27957b1761e3", + "uuid": "8d255d12-e611-4a9c-914a-4fb864ab1e89", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -10713,7 +10651,7 @@ ] }, { - "uuid": "246d5f8e-eda8-4c59-8c8b-7c7484aa0bb7", + "uuid": "e132472f-a6dd-4e0d-9be9-57ede22448b4", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -10730,7 +10668,7 @@ ] }, { - "uuid": "eb3b2e6f-4699-4a84-be38-5b5a58c410f3", + "uuid": "b3ca667a-8bfc-4c66-bddd-ecb4cbff1ac0", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -10772,7 +10710,7 @@ ] }, { - "uuid": "1af4d44f-954a-48ee-b04f-8942a63e2b94", + "uuid": "bb7fa268-c85a-40ae-afe8-b9afa6b4445e", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -11134,7 +11072,7 @@ ] }, { - "uuid": "eff88c13-abb9-4668-b5a7-49c30b73c0c8", + "uuid": "d9f4f1ae-97c0-43d5-8f9a-d71733959d8a", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -11551,7 +11489,7 @@ ] }, { - "uuid": "b7fd8c1a-d895-4f83-8595-2f838809e337", + "uuid": "f4a29f79-698a-4b05-8f94-79ba945cb8a9", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -11659,11 +11597,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } @@ -14857,82 +14790,58 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_127" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" } ], "control-implementations": [ { - "uuid": "ac7641b4-424d-4e44-93d7-34be4534100a", + "uuid": "e5ba8909-5efe-44ec-b92e-8392181f12a3", "source": "trestle://profiles/rhel9-hipaa-addressable/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -14982,7 +14891,7 @@ ], "implemented-requirements": [ { - "uuid": "69074e2b-9b7d-4ecc-a9ea-d5452ebe1ad7", + "uuid": "35c1a3d1-c756-4c49-a94c-d20d765955d9", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -15004,7 +14913,7 @@ ] }, { - "uuid": "e2e98885-e3e7-415d-a5ae-d98deedf7540", + "uuid": "d5812c82-911a-4cc0-acea-692558926107", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -15021,7 +14930,7 @@ ] }, { - "uuid": "4b5b764b-7cf7-4251-8734-c8418ecbfa54", + "uuid": "451c6232-b564-4722-9ccb-a1e30edab112", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -15098,7 +15007,7 @@ ] }, { - "uuid": "32fedfe5-15e4-43f0-a98b-0e226e960f99", + "uuid": "bb420ae8-eb00-4a3b-a7a4-3fb94b4050a5", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -15175,7 +15084,7 @@ ] }, { - "uuid": "b83a6def-b39d-4fc4-a077-45cdb5800aeb", + "uuid": "98d1aefe-8d28-4787-9919-637b39b4ea47", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -15252,7 +15161,7 @@ ] }, { - "uuid": "4673533c-c6b6-4937-aa45-4008628f3755", + "uuid": "5e35e438-4dfa-4629-9c6f-7d605f27b169", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -15484,7 +15393,7 @@ ] }, { - "uuid": "70fbd114-4390-4b6e-b20f-1bbdef9c2a6e", + "uuid": "380f240b-4267-4e79-a2c1-ef59d14eb601", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -15586,7 +15495,7 @@ ] }, { - "uuid": "3e4529c6-98a4-402f-a865-4acb220b1cd0", + "uuid": "b979a816-d887-480a-a2dc-044f4cb4a108", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -15603,7 +15512,7 @@ ] }, { - "uuid": "e23ab001-cce9-4df8-9306-a23df5497e50", + "uuid": "b3be3973-cff8-424e-b541-b3138532a53a", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -15630,7 +15539,7 @@ ] }, { - "uuid": "15ed8303-1138-4cb1-bd19-bb6b51fb50aa", + "uuid": "ed0420b1-bb82-4de3-877d-61b44bd4b71c", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -15672,7 +15581,7 @@ ] }, { - "uuid": "49227fa4-87f8-425b-bd4f-e9692e1507ec", + "uuid": "f9e287e7-1ace-45c0-b806-79adec2a72da", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -15714,7 +15623,7 @@ ] }, { - "uuid": "c57a8241-f71e-45d8-a5c7-b76d9ef30548", + "uuid": "c87d5093-b2c7-49d0-a698-1879142b6355", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -15822,16 +15731,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "341fa710-9ca0-426b-96be-d118bdd2aee8", + "uuid": "44b76c1a-d441-479e-900e-b8983c7e630f", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -15903,7 +15807,7 @@ ] }, { - "uuid": "aa645b11-c8cd-4f35-8e06-7bbd22246256", + "uuid": "722be006-f0ed-4f18-9efa-38cb31f8bb06", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -15975,7 +15879,7 @@ ] }, { - "uuid": "0e2b6ec3-2370-4cb7-976d-cb4e01c246b6", + "uuid": "aa45bd8a-6ff5-492c-ad83-1dcaee3067b1", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -16083,16 +15987,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "8890d162-c0d4-49fd-9bb7-f4852e844953", + "uuid": "94cb4f8f-0173-4d60-9e2e-2e556500bec2", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -16114,7 +16013,7 @@ ] }, { - "uuid": "34428e80-c28d-4c2b-922f-0c074e3d830b", + "uuid": "a64f9ed6-b9d0-4d57-a92f-0df0fdf71165", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -16491,7 +16390,7 @@ ] }, { - "uuid": "90f44ae8-56ec-476f-9f73-18fc2828b600", + "uuid": "7017598b-8be1-456d-9346-9e83ce1da788", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -16568,7 +16467,7 @@ ] }, { - "uuid": "7da8f33c-3003-400f-ad62-01c6dd898888", + "uuid": "ec763395-8ae3-4983-b372-46ac7870c48f", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -16590,7 +16489,7 @@ ] }, { - "uuid": "40bd0cc6-3325-4234-aa2f-b21389736b84", + "uuid": "33190b7b-9ed5-4cc5-8da0-274329023941", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -16703,16 +16602,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "225a9c04-e52f-4d18-8b5d-364ed1a7fb70", + "uuid": "0015af09-7ebe-4d9b-8fad-91355ba007f2", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -16724,7 +16618,7 @@ ] }, { - "uuid": "ef61c1a1-78a9-4a8e-9c7e-a424b498d412", + "uuid": "5c5c4fba-01ef-4b34-ac61-e4b17708a4d9", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -16801,7 +16695,7 @@ ] }, { - "uuid": "501d2f42-7795-485d-b9a8-43902e1f93d4", + "uuid": "361791d4-1a7a-4357-8f84-4e737735ea54", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -16828,7 +16722,7 @@ ] }, { - "uuid": "2df76abc-f381-4846-b6f0-13ce514cb15e", + "uuid": "cfa6b90c-f9c5-4d88-929a-7a6e1d7800c7", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -16965,7 +16859,7 @@ ] }, { - "uuid": "3c7bf52b-0449-4938-9391-0730c4122b3b", + "uuid": "1328c11c-548b-4201-9182-591866d559e2", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -16982,7 +16876,7 @@ ] }, { - "uuid": "9fe9eb94-cd42-433e-85d4-d800bbb24028", + "uuid": "b78f7941-fe08-41ab-9ba9-81863bb6d40c", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -17069,7 +16963,7 @@ ] }, { - "uuid": "3da88e7a-0eb9-4e9a-bfe3-05b24c52c843", + "uuid": "af73fbe1-6eb4-4500-97b3-b21f02260e1c", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -17091,7 +16985,7 @@ ] }, { - "uuid": "3e83b7b7-8ae4-411a-b7a7-c5b4b4d338f6", + "uuid": "000be660-670a-4ae1-a8b6-c5d741a32a62", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -17168,7 +17062,7 @@ ] }, { - "uuid": "4062ba75-b10d-4cce-844a-ecb000cb0771", + "uuid": "4ef7b13c-36ab-4be5-a3ea-1c6c2c0daf0f", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -17195,7 +17089,7 @@ ] }, { - "uuid": "95ddb0f5-a820-4797-9b3f-ada51318e30e", + "uuid": "e5be736f-0e4f-4bc8-91e9-0a13c75caaa8", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -17617,7 +17511,7 @@ ] }, { - "uuid": "79b21331-375a-461b-8af0-49a0fc74909d", + "uuid": "9670de51-a5a1-4964-81f1-9d5dd17f1f7c", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -17634,7 +17528,7 @@ ] }, { - "uuid": "de2f5bff-9b00-4c0e-b716-8a1c346f4dd1", + "uuid": "844d946e-4da2-420c-9d7f-449294088365", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -17676,7 +17570,7 @@ ] }, { - "uuid": "f77cfd9d-d524-4159-a7ca-b3fc93e86a60", + "uuid": "2517bdd6-b1b0-46d8-bf16-636b3354bbe1", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -18038,7 +17932,7 @@ ] }, { - "uuid": "5b6f4e89-1114-44e0-b58d-265e7918db34", + "uuid": "4397b3e6-1a16-4df2-9150-2fc6ac9409ea", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -18455,7 +18349,7 @@ ] }, { - "uuid": "3b364d92-8810-4494-9a67-ef5001d975f3", + "uuid": "2b0da30e-4eef-48c6-a606-68661ba8f4f2", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -18563,16 +18457,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "6ecc7985-b9b1-4b3e-8a9a-6e4027dbba65", + "uuid": "798ad8bd-6221-42bb-bc5f-7d25a01e94fb", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -18594,7 +18483,7 @@ ] }, { - "uuid": "ea22810e-32c6-4f2e-906a-93a2fe3fef57", + "uuid": "a04eb217-b8ee-4ecb-a3d2-1c9376625cb2", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -18611,7 +18500,7 @@ ] }, { - "uuid": "7e937e36-29a0-4dba-80ba-fdf8f73cba8e", + "uuid": "47f8e360-d562-4614-ac90-301a52923f29", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -18688,7 +18577,7 @@ ] }, { - "uuid": "7f82ca7d-ce69-4b89-9ffb-825c6e6ab84c", + "uuid": "036fe4b8-2e3f-40f4-9841-1f113d0fec4e", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -18765,7 +18654,7 @@ ] }, { - "uuid": "d2b659fa-dbff-492d-8fb2-63c835c0a510", + "uuid": "5563b408-561c-4644-b60f-85ad6c598ffe", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -18842,7 +18731,7 @@ ] }, { - "uuid": "5162c67b-116d-4d8d-bbd9-785a3ea0537e", + "uuid": "9e5ca649-5c86-4ee1-8bd4-8bdfeeb9fb14", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -19074,7 +18963,7 @@ ] }, { - "uuid": "91bfd479-8356-4456-a362-f1b450ee0d4f", + "uuid": "d13583ff-c4bc-49af-b23f-74a83f3cf4e4", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -19176,7 +19065,7 @@ ] }, { - "uuid": "4b3653db-6009-400e-b67d-1e7264600caa", + "uuid": "de356763-5d0a-43c0-90df-9a1f5ba07d5a", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -19193,7 +19082,7 @@ ] }, { - "uuid": "64c0e886-3e13-43e9-8c10-f86804866319", + "uuid": "70c606aa-fb9c-4240-ad96-a64e80763513", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -19220,7 +19109,7 @@ ] }, { - "uuid": "1d4f5e74-64a1-41c5-b4fc-5c06f7645213", + "uuid": "cb208070-5912-4733-b8a0-2dd8b7144d09", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -19262,7 +19151,7 @@ ] }, { - "uuid": "4d33550b-c58e-43be-b283-a8398942a083", + "uuid": "c55009a1-5646-43b7-afcc-f2fe95bcd835", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -19304,7 +19193,7 @@ ] }, { - "uuid": "bc2ef8be-6b41-4615-9df9-1e0b207a6dbb", + "uuid": "13530d04-e41e-4246-91f8-fba87e7a36f0", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -19412,16 +19301,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "07c6f457-6416-4139-9a83-3593c6020136", + "uuid": "6b225139-8985-47e2-b822-d7d78582db6b", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -19493,7 +19377,7 @@ ] }, { - "uuid": "e640867d-ef8d-4468-97f1-7690033198fd", + "uuid": "f8904cad-c453-4258-a675-e2629c110263", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -19565,7 +19449,7 @@ ] }, { - "uuid": "6850656b-fea9-40d7-8e71-82df2711f65d", + "uuid": "c2b43b09-6a9f-477c-a613-f9a416920bde", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -19673,16 +19557,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "cc2a404a-8a7f-4310-b585-7452a4686b5e", + "uuid": "02d9f254-f36d-485f-b721-2b70ef77e97a", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -19704,7 +19583,7 @@ ] }, { - "uuid": "d877009d-1172-45fb-a226-ff17328dc202", + "uuid": "61d8a694-5b5a-4f3c-a829-3f84d95a79ec", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -20081,7 +19960,7 @@ ] }, { - "uuid": "60c5d038-91a6-4176-8e59-ca7a827338cd", + "uuid": "94413e2b-a42d-4414-93e2-7fa0c305cbe8", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -20158,7 +20037,7 @@ ] }, { - "uuid": "0cb7d11f-0cea-4113-ab3f-0011450379af", + "uuid": "552fd80c-8d86-4aa2-8ecb-e9a02746a25c", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -20180,7 +20059,7 @@ ] }, { - "uuid": "51abc224-d76c-4c51-b184-525469da7897", + "uuid": "562a7c7c-1af4-4f6e-a546-220772fa3116", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -20293,16 +20172,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "5e810907-fd1e-4683-a81a-f9c0dbded4bd", + "uuid": "c7e90145-9e48-414d-80ee-57f4c0d497f6", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -20314,7 +20188,7 @@ ] }, { - "uuid": "4223450e-80f5-4dcc-85de-c93cd55de9c7", + "uuid": "3f0c2f7e-f231-405d-a007-dbc86c601c35", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -20391,7 +20265,7 @@ ] }, { - "uuid": "57e89c54-55bc-46a6-b47e-6a112fb0af4b", + "uuid": "0c4a01d6-df1e-4949-85ab-7d255b2efa2a", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -20418,7 +20292,7 @@ ] }, { - "uuid": "e95b2dd8-e516-4304-af28-f6b2d7412346", + "uuid": "b7834fc9-bcd5-402e-8a61-76f8decdfed0", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -20555,7 +20429,7 @@ ] }, { - "uuid": "65f4b69f-db97-456a-9827-757d5d8cb200", + "uuid": "c1114ffc-afcd-4e87-89c5-d5561b343596", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -20572,7 +20446,7 @@ ] }, { - "uuid": "ec9ac9fb-affe-4911-8c81-5b7bbe9d6264", + "uuid": "3ddfb026-ad1f-4c4a-9b10-e18e958d00ac", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -20659,7 +20533,7 @@ ] }, { - "uuid": "739b0dd0-da97-4f50-8559-58f41128ce64", + "uuid": "690f9279-6fa3-4fcc-aba5-a7e5a8c4ebec", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -20681,7 +20555,7 @@ ] }, { - "uuid": "5b0540e6-8315-416c-85cc-2bc62de07900", + "uuid": "3e87a383-e192-455a-9b18-3ee40f0c41b5", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -20758,7 +20632,7 @@ ] }, { - "uuid": "d2e60264-08e1-4ed4-848c-1e0eade662ef", + "uuid": "7e667c09-3e3d-4c80-939e-bd50030a4e22", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -20785,7 +20659,7 @@ ] }, { - "uuid": "ced2cb9c-fafe-4bb7-9fc3-85812776e04e", + "uuid": "318b1b8a-b3e8-4b26-89eb-bc07cf79821a", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -21207,7 +21081,7 @@ ] }, { - "uuid": "de781005-c207-4555-9dde-ed967a42ae37", + "uuid": "ae952713-ef11-483e-ad91-9808ecff25fe", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -21224,7 +21098,7 @@ ] }, { - "uuid": "246e9604-1978-42b1-b7bb-00b2d392dd46", + "uuid": "66aad3fb-86d1-4ff2-9ca2-179515fba74f", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -21266,7 +21140,7 @@ ] }, { - "uuid": "a3a9335e-0bef-43ab-9429-5b7b0eb905b6", + "uuid": "80831a78-754e-4d0a-84e0-6a516760123d", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -21628,7 +21502,7 @@ ] }, { - "uuid": "4d53b3b0-f2aa-41ac-bf72-dd83548f04cd", + "uuid": "a3e459a2-76c6-471e-8fe5-1735e063d611", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -22045,7 +21919,7 @@ ] }, { - "uuid": "5bc4d45f-39c8-4c3f-86b8-f64b10789357", + "uuid": "ba3dcc92-e95f-444e-b0ec-4a0a7896ca4e", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -22153,16 +22027,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "84881f27-ad6f-4b43-8ea5-54fd1eb9e68c", + "uuid": "33324bc8-bb30-4b51-87ba-c17f9b89b9be", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -22234,7 +22103,7 @@ ] }, { - "uuid": "bd914fbf-deaf-4345-802e-7e5f535f0715", + "uuid": "7471a98b-5443-4d2f-b356-04f755fecd2b", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -22306,7 +22175,7 @@ ] }, { - "uuid": "dd2b425a-9027-491d-9a28-e78ff1cb9e0d", + "uuid": "29f134f9-9535-4fb5-9991-06b5906086b3", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -22414,16 +22283,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "094e9a0a-7b5e-4670-9bf7-e27fbecaedfe", + "uuid": "efc472c4-3725-49de-86f6-806888cb17e4", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -22445,7 +22309,7 @@ ] }, { - "uuid": "2a8075e1-ba8c-4877-8ec2-b2231e452d4f", + "uuid": "78a8fc83-fd42-4a8c-a7c9-9f5c27fbe706", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -22822,7 +22686,7 @@ ] }, { - "uuid": "e5d8e4a8-2e8a-4678-a7ea-d552e1ea2c2f", + "uuid": "274d4cda-76da-4436-a3a8-0373600d29ca", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -22899,7 +22763,7 @@ ] }, { - "uuid": "5248ab21-fde9-4d38-8540-9f85ff655c51", + "uuid": "408b8686-4884-4bb6-808d-ba1bb27d2925", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -22921,7 +22785,7 @@ ] }, { - "uuid": "851690bd-b46f-4581-8321-05f54397bf38", + "uuid": "996efdcf-9564-4970-903f-bec473e9bb3e", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -23034,16 +22898,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "dbea29c1-bb6f-41a8-a50d-bfebd34fb9ce", + "uuid": "139cb35c-21ea-41e6-bb07-c57df2aab4c8", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -23055,7 +22914,7 @@ ] }, { - "uuid": "e295508f-5d08-4581-9b33-1d776390f9cf", + "uuid": "d6012fcb-991c-487d-8e40-f231e27a2e48", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -23132,7 +22991,7 @@ ] }, { - "uuid": "f1b90b53-2d9e-4afe-98cb-6867b30aa3a7", + "uuid": "19f7078b-2863-42dd-8fd2-18012caf4bc6", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -23159,7 +23018,7 @@ ] }, { - "uuid": "3ee02139-b3c2-4325-af1d-dbd0f6ecb475", + "uuid": "2eaeff01-dbe6-4111-bcc1-742a25d87d80", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -23296,7 +23155,7 @@ ] }, { - "uuid": "341ddd81-d9b8-4b4c-b448-48401b7e3dff", + "uuid": "bca9786f-c2d3-4bee-b700-d2e43792e27c", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -23313,7 +23172,7 @@ ] }, { - "uuid": "c786a18a-23f1-45fc-81ce-abd79a3a2669", + "uuid": "7edc5053-6377-49bc-8154-fba62ab92a65", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -23400,7 +23259,7 @@ ] }, { - "uuid": "24d3704c-e3e5-47bd-88e7-e9d6d7c56a96", + "uuid": "ddb07302-3df7-4a10-9ad5-b58dc8892e35", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -23422,7 +23281,7 @@ ] }, { - "uuid": "bf4aaffa-877f-44da-b2c2-d59a14a3a415", + "uuid": "262ec91f-db88-4ec9-8fdb-69df0addf533", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -23499,7 +23358,7 @@ ] }, { - "uuid": "661e444b-4b88-46b6-988e-c1bbb2955bb6", + "uuid": "dca07bc2-ce43-4d34-bfbe-6a0799e613ee", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -23526,7 +23385,7 @@ ] }, { - "uuid": "958cb5d7-e8fe-41f5-95ea-a7ba0fc22a58", + "uuid": "80d9158c-69cd-4f0f-bdaf-f67e21f112f9", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -23948,7 +23807,7 @@ ] }, { - "uuid": "66842ced-76b2-44a8-a580-2c572a8d0eb3", + "uuid": "23f7ac71-1edc-4abb-8673-615653e65d81", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -23965,7 +23824,7 @@ ] }, { - "uuid": "abb80c22-5aae-4c2e-b439-ba669a760f99", + "uuid": "6ee727c7-3eef-439f-abaa-1879f1b1a4f8", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -24007,7 +23866,7 @@ ] }, { - "uuid": "64e3d81a-f1ea-436b-8240-0d9fc494e0d8", + "uuid": "a4c6f3fd-ac24-4021-92b6-230497c5e9e3", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -24369,7 +24228,7 @@ ] }, { - "uuid": "c86af504-fc8a-46ab-9761-f61d33a8da5e", + "uuid": "1fd29c70-a7b1-4450-b5a0-95648307446b", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -24786,7 +24645,7 @@ ] }, { - "uuid": "90683ec2-7fc8-4935-b4a0-132d4898998d", + "uuid": "91fe6b1d-0e5e-452e-9a13-10aba27493b0", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -24894,11 +24753,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } diff --git a/component-definitions/rhel9/rhel9-hipaa-base/component-definition.json b/component-definitions/rhel9/rhel9-hipaa-base/component-definition.json index f96c6fced..c498e2328 100644 --- a/component-definitions/rhel9/rhel9-hipaa-base/component-definition.json +++ b/component-definitions/rhel9/rhel9-hipaa-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "5f1bbd60-18a6-4e20-a958-5787a745a2df", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-09-26T16:26:09.598753+08:00", - "version": "1.2", + "last-modified": "2026-03-27T01:29:15.097887+00:00", + "version": "1.3", "oscal-version": "1.1.3" }, "components": [ @@ -1658,46 +1658,34 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_127" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" } ], "control-implementations": [ { - "uuid": "ca252271-6985-486e-9df8-6c0e04d7cbaf", + "uuid": "b440afc7-096a-4897-bd3c-4c7b8df5da4d", "source": "trestle://profiles/rhel9-hipaa-base/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -1747,7 +1735,7 @@ ], "implemented-requirements": [ { - "uuid": "280b7665-bf87-46b7-a676-bdbf6bc48695", + "uuid": "806fb859-8ab1-4112-8321-9b824e0ec625", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -1819,7 +1807,7 @@ ] }, { - "uuid": "c5b6792f-0b6a-4569-af96-07ef2d06a403", + "uuid": "5a915a30-1300-4f31-a84f-2e1d3fb72322", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -1891,7 +1879,7 @@ ] }, { - "uuid": "19550ebe-4230-45f1-a8f8-7f462f6becbb", + "uuid": "8732715e-cb23-46d7-8cbc-d998fad6c80c", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -1999,16 +1987,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "3b000e77-0434-4c45-8be1-bc3ba578d4e6", + "uuid": "9e307032-e17d-47cb-addb-23960ccddf33", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -2030,7 +2013,7 @@ ] }, { - "uuid": "34126abf-e5fe-45a4-887f-67a4f74e8ec6", + "uuid": "84111caa-bb0e-4388-bb14-38546b3dda81", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -2407,7 +2390,7 @@ ] }, { - "uuid": "3d3d0ff6-6b2d-4e27-a0a9-662cd076795e", + "uuid": "c7adf99b-8810-4a88-9e1b-88291071fa49", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -2484,7 +2467,7 @@ ] }, { - "uuid": "f189fc8c-57a3-4500-99c9-0752cfa941f8", + "uuid": "a98af427-08a3-4f7d-9168-fa98a58d1300", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -2506,7 +2489,7 @@ ] }, { - "uuid": "e6bc59d4-12e7-4216-a12e-d2641ca9900e", + "uuid": "a287e5d3-f51f-425b-b96f-dd8c8f2893d5", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -2619,16 +2602,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ab003afe-42c7-4255-8f5f-e659e070f19b", + "uuid": "f3b835af-97e9-49a6-baa7-eb5f1b0bb4ed", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -2640,7 +2618,7 @@ ] }, { - "uuid": "09d6b33f-1473-40d0-b35f-0e1bc13893c9", + "uuid": "7ca200c1-896e-4066-ad6e-d285719c58d7", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -2717,7 +2695,7 @@ ] }, { - "uuid": "f8fea45a-6939-4042-978c-1ed348778352", + "uuid": "6f856cd3-f7c3-463b-9286-47b7dfe3b76d", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -2744,7 +2722,7 @@ ] }, { - "uuid": "c4a19b9e-5df7-436f-863d-7c72550e907e", + "uuid": "7c3ec0f9-4d13-49df-a019-eeb46e17544c", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -2881,7 +2859,7 @@ ] }, { - "uuid": "e60836ff-8f74-4f1a-b33e-68907a8d0f10", + "uuid": "0505d1bc-3dd5-4dc9-9e44-12c5dc0609a6", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -2898,7 +2876,7 @@ ] }, { - "uuid": "204f4cc5-ca5b-4f72-a522-49736b4547b2", + "uuid": "9f0ec5ca-073b-4299-bb1b-7d8d8c151024", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -2985,7 +2963,7 @@ ] }, { - "uuid": "d18a3d26-a65a-4abc-9af3-849de614706f", + "uuid": "870f9cb9-3865-4a18-bb40-ba8bccc4283e", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -3007,7 +2985,7 @@ ] }, { - "uuid": "7741e962-6cc4-4499-a323-5ee401695bd1", + "uuid": "d54e17e7-a831-4e1b-a9fb-e52237cd8e1b", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -3084,7 +3062,7 @@ ] }, { - "uuid": "188d8fcb-6e47-48dc-9e0a-8fc134021320", + "uuid": "c7588b2c-9ccd-4ab8-8e7f-9884a8af892a", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -3111,7 +3089,7 @@ ] }, { - "uuid": "8b61f1bf-92f7-48fc-90ce-5c0c0b662be7", + "uuid": "457c097c-10cf-483f-bbb4-6645d7c480df", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -3533,7 +3511,7 @@ ] }, { - "uuid": "872a4bb8-0be3-4701-9e9f-48020d39ed97", + "uuid": "42e051d9-1ad6-49f6-8432-f1255f530540", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -3550,7 +3528,7 @@ ] }, { - "uuid": "4db156f5-b471-4396-955a-eb3416cc3c9f", + "uuid": "f345e395-3f17-474d-807c-5902fa1c9966", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -3592,7 +3570,7 @@ ] }, { - "uuid": "c1f071d5-c6aa-41fd-a4d5-16cda1ab4240", + "uuid": "4a2016f5-f3e9-4355-a855-effc57a1bfac", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -3954,7 +3932,7 @@ ] }, { - "uuid": "a4d29806-e1b6-49e3-8351-88cf38221194", + "uuid": "f540bc2e-8086-4070-b26c-89e035d79d34", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -4371,7 +4349,7 @@ ] }, { - "uuid": "f5e66ef6-98ee-4ec9-b31e-a6b7835b8994", + "uuid": "65ae5e1c-0e79-4ff6-900d-ee46a165323b", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -4479,16 +4457,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "b579bf2a-9146-4db9-8de4-4fdbf403f1a9", + "uuid": "21a17e01-1807-499e-acf6-61883e644442", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -4560,7 +4533,7 @@ ] }, { - "uuid": "488ca813-974e-4482-883a-878a1837d9e0", + "uuid": "7dcfc790-95c6-44cc-ab47-b0bbdd2f18db", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -4632,7 +4605,7 @@ ] }, { - "uuid": "78a99ffd-e363-4338-b275-3cce6c2bdbe0", + "uuid": "a2c40eb9-c439-421b-956c-dd42c8af0e45", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -4740,16 +4713,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "8c28103b-0705-4895-af8d-5018d9a51b1e", + "uuid": "b97ae582-c82a-43de-a8b9-9d73cc98b03a", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -4771,7 +4739,7 @@ ] }, { - "uuid": "f75a5878-70a8-4a50-ae56-8846de20e749", + "uuid": "7c881198-567b-457b-858e-650862fe5f28", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -5148,7 +5116,7 @@ ] }, { - "uuid": "9c6c5e85-bfb8-4952-acd4-1e5916a974a3", + "uuid": "6dd12b63-0a07-4150-858f-b7907edfc3d1", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -5225,7 +5193,7 @@ ] }, { - "uuid": "629875fc-213a-48f1-a51e-495a22912ab4", + "uuid": "2d693627-8377-42ac-a3ad-6e3222663e89", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -5247,7 +5215,7 @@ ] }, { - "uuid": "cd351b21-6f80-4826-a2bd-847dc63f475b", + "uuid": "e8b705ea-7946-40a1-a207-07288fe8960d", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -5360,16 +5328,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "36f9962e-61e2-44fc-98e7-3bc35c8d2017", + "uuid": "cda5fb84-dea3-438b-b5f9-aec0d2e0a4df", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -5381,7 +5344,7 @@ ] }, { - "uuid": "0b03da13-12a5-42f8-a0aa-f44eb0a23a05", + "uuid": "ededca94-df80-40cb-bb12-6327849bd1a8", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -5458,7 +5421,7 @@ ] }, { - "uuid": "09c06181-fed8-4535-a993-be63ecda6637", + "uuid": "ac1d58ab-94ac-45e7-a785-b12e91f220f0", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -5485,7 +5448,7 @@ ] }, { - "uuid": "8876445f-a326-4754-a341-a52d4b5c69ff", + "uuid": "e3817ef5-53d5-42a1-b788-f9057112ec96", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -5622,7 +5585,7 @@ ] }, { - "uuid": "298b2048-4729-42cb-ad66-bd4ae9cdb3de", + "uuid": "55abf9e8-d115-4e3f-b877-0019cc87ff1a", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -5639,7 +5602,7 @@ ] }, { - "uuid": "c09cb429-62ba-4e20-89d1-970bd131fce5", + "uuid": "f29b399a-a039-4042-b2ee-8f14721f75f2", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -5726,7 +5689,7 @@ ] }, { - "uuid": "16d3466e-316a-4cef-87b0-f23a857a5db5", + "uuid": "c691d878-0eae-4c4d-bf16-4446c4e2bdde", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -5748,7 +5711,7 @@ ] }, { - "uuid": "b141d6ef-38f6-445a-b504-e7f3d4d41176", + "uuid": "442b6927-440a-4e9e-b689-9129c2ba1e9a", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -5825,7 +5788,7 @@ ] }, { - "uuid": "53c1d384-f275-4bab-bd0b-24a3b93226b0", + "uuid": "0c6911bb-4631-4a84-a76e-dd8a9a06af7f", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -5852,7 +5815,7 @@ ] }, { - "uuid": "87f169f1-da40-44d0-9106-a8e75efb0d92", + "uuid": "4ae05b50-c4f7-435e-b322-4885d924c04f", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -6274,7 +6237,7 @@ ] }, { - "uuid": "630e62e4-119f-4921-acad-71b4d9ed1eea", + "uuid": "16897fb8-0335-448d-b899-ce72fd170e02", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -6291,7 +6254,7 @@ ] }, { - "uuid": "f7ce307c-7f7e-40ff-8a8f-0e8f623d8749", + "uuid": "2c6c260f-6c4f-46e9-b70f-924eace92475", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -6333,7 +6296,7 @@ ] }, { - "uuid": "5c660ee2-5b71-4650-a13f-2ab25ac1dab7", + "uuid": "ce9d6dbc-0da0-4926-9692-41747cbae5fc", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -6695,7 +6658,7 @@ ] }, { - "uuid": "120b210f-874d-4f81-a365-22d3a21fdd0d", + "uuid": "1620d4e1-762b-466f-900e-f5bef4653321", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -7112,7 +7075,7 @@ ] }, { - "uuid": "f9d94bda-6794-46f1-a63f-f0b4dceb92aa", + "uuid": "1d447c2f-6dd0-42db-a335-9fbcfd3458f6", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -7220,16 +7183,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ae32ba55-127f-46ea-aec1-ed7299f61ddc", + "uuid": "ace94fed-aa00-4dfc-ab13-63c14ef1ab7f", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -7301,7 +7259,7 @@ ] }, { - "uuid": "1b5db10e-4b25-4c14-a80a-436da153a8ee", + "uuid": "d287e507-cea9-46f8-bf67-c404b966983b", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -7373,7 +7331,7 @@ ] }, { - "uuid": "9e4fd494-a2dd-4428-93b5-3b77d28a1221", + "uuid": "026eed62-df14-4ece-b4ef-927560b72b5e", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -7481,16 +7439,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "fb94a0b1-ef8c-4060-9061-ae80fa752566", + "uuid": "3b7756be-fb28-4a07-ad5e-3dca0e3c87dc", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -7512,7 +7465,7 @@ ] }, { - "uuid": "73f5de29-4743-48e0-a4a6-56885a8a60ec", + "uuid": "e87ef292-8e86-447f-acd0-4fdd6315986a", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -7889,7 +7842,7 @@ ] }, { - "uuid": "8317731b-6970-44ab-beff-fbeda986029a", + "uuid": "87829dd5-db39-40ba-9037-058f75fd2743", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -7966,7 +7919,7 @@ ] }, { - "uuid": "9e6852ea-533d-41a5-b04e-f1ec3149cd98", + "uuid": "5d907419-02c4-4f66-ad1f-0ae7ef19bada", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -7988,7 +7941,7 @@ ] }, { - "uuid": "1d91b703-32bc-4c33-8c69-0e93a2817593", + "uuid": "8c6c4970-158e-478d-a10c-626d8564897b", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -8101,16 +8054,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "c192b01f-7437-443b-bb48-e2c8b437b1f2", + "uuid": "4c0c06ec-e64e-4799-b32a-10be01145c42", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -8122,7 +8070,7 @@ ] }, { - "uuid": "6720b133-f8bd-47ab-8685-e1863c921817", + "uuid": "ac106461-41ce-4dff-abdc-2345491e5355", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -8199,7 +8147,7 @@ ] }, { - "uuid": "70ddcfa4-8a54-4911-8c3e-6e0d18ec5bad", + "uuid": "825afd2b-1387-43b6-bd23-b314202a73d7", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -8226,7 +8174,7 @@ ] }, { - "uuid": "a4dae305-96da-44dc-88cc-53c17ffe45f1", + "uuid": "801e6795-bc60-4e8e-a7e2-c44189232c23", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -8363,7 +8311,7 @@ ] }, { - "uuid": "da2076d7-f87d-48af-8703-2917654913d5", + "uuid": "53fdb278-a486-42af-9472-b6aff81044b7", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -8380,7 +8328,7 @@ ] }, { - "uuid": "470a661a-d0b7-48a9-a540-e79738b0a102", + "uuid": "87617dec-6c9e-41ce-9999-cf6ada49f51a", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -8467,7 +8415,7 @@ ] }, { - "uuid": "2f00774c-c5ec-48a4-9e2b-a8ae8b445e0c", + "uuid": "a983d874-f89d-4757-9076-898f883149fd", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -8489,7 +8437,7 @@ ] }, { - "uuid": "028e0410-dba1-452e-9143-4d9abba79b41", + "uuid": "6f938731-2454-4cc7-8c1c-f148bcd65ea1", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -8566,7 +8514,7 @@ ] }, { - "uuid": "367ca5fb-4ddf-40d7-90d2-1d2a94a214b0", + "uuid": "0090a12f-769f-40e0-9d73-d1a979b0c596", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -8593,7 +8541,7 @@ ] }, { - "uuid": "df9c5b73-4aea-476d-b635-82e6600ebe7d", + "uuid": "bbbe15e2-9146-43f5-8be5-68967a64e3b5", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -9015,7 +8963,7 @@ ] }, { - "uuid": "0c709f14-6686-4294-a99f-fd1fde2e5cea", + "uuid": "6fc19bc1-8fe7-4038-98f4-09bf1499cd89", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -9032,7 +8980,7 @@ ] }, { - "uuid": "112ec127-f871-4c3e-8552-884506b8b9ac", + "uuid": "39999e49-66d7-4012-81a6-5814f4713fa4", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -9074,7 +9022,7 @@ ] }, { - "uuid": "02254937-80e5-452f-ab20-e778a10855ad", + "uuid": "723dfc94-209f-41d5-897f-38d11340b823", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -9436,7 +9384,7 @@ ] }, { - "uuid": "18836453-830a-4aa8-a30f-c2a86408b090", + "uuid": "fae66fec-1398-43aa-8a63-6873518a304d", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -9853,7 +9801,7 @@ ] }, { - "uuid": "fad345c6-fa68-4e54-860c-1cbb968cb85d", + "uuid": "329f34d4-feb6-4626-a175-2be91529aea3", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -9961,11 +9909,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } @@ -13159,82 +13102,58 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_127" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" } ], "control-implementations": [ { - "uuid": "b41fa971-989a-4d0b-9f3d-6e98a2b3b38b", + "uuid": "fc7ac58c-5a93-4ef2-9248-570d4149c0e0", "source": "trestle://profiles/rhel9-hipaa-base/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -13284,7 +13203,7 @@ ], "implemented-requirements": [ { - "uuid": "dad323d1-0c29-4b13-b6a1-946240b60e08", + "uuid": "312f80fa-dba5-4b31-a223-46a48088d706", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -13356,7 +13275,7 @@ ] }, { - "uuid": "b35ee4a7-9eb2-4333-9a41-c9e65bcea9a2", + "uuid": "ff1182ca-cc60-4ce1-8fe0-8a3781b1303b", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -13428,7 +13347,7 @@ ] }, { - "uuid": "6afeabdd-14b3-448d-9a37-ed0207a30fc4", + "uuid": "859aba40-4c66-4484-96fc-9aadd2628fe9", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -13536,16 +13455,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "09011845-5998-420e-bca9-a25db7958e5e", + "uuid": "fe2b8fa9-22d9-4620-8d7f-bbfdf438c8cb", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -13567,7 +13481,7 @@ ] }, { - "uuid": "4c385a9b-37ea-4dc8-b12c-2f6ffcc5c1d6", + "uuid": "3053d2f2-8f58-457d-a97b-d649c9dc225f", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -13944,7 +13858,7 @@ ] }, { - "uuid": "e0a22d01-e7cb-4586-b604-36f29aa0f76b", + "uuid": "4c8d1f00-b8e3-49ef-b5f0-3a3dc39a130d", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -14021,7 +13935,7 @@ ] }, { - "uuid": "c3ebcfe2-8697-4b2b-9e75-02a7d93507ad", + "uuid": "77650659-330d-47e1-8d88-53e62e2dbb92", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -14043,7 +13957,7 @@ ] }, { - "uuid": "869e1970-6b07-4814-a578-5e4e7d7a94e3", + "uuid": "65cf6fd1-1f91-4685-9808-d19eda02ed40", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -14156,16 +14070,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ae05694f-2f56-44b8-9a3f-4d8bf26f21dd", + "uuid": "8fc2b9d9-cf22-459b-b987-6dce734efd5f", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -14177,7 +14086,7 @@ ] }, { - "uuid": "65a213de-30e6-4c74-a5e9-65462cdd49aa", + "uuid": "6f776367-7cf3-46ed-b6c8-3ecc9abd982c", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -14254,7 +14163,7 @@ ] }, { - "uuid": "94a33594-1293-4a9f-8110-2bf9eed25005", + "uuid": "016bffc2-6c49-47e0-960f-47c4e8d2fdd3", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -14281,7 +14190,7 @@ ] }, { - "uuid": "cc940155-2b59-4842-a7db-15ab45ddf833", + "uuid": "3ceec188-387f-4988-92a6-647dca83fc11", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -14418,7 +14327,7 @@ ] }, { - "uuid": "44049eb9-7d49-46fc-8a28-079fa49a1eb0", + "uuid": "332bceb2-9dc8-4b63-988a-056b99da8a3c", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -14435,7 +14344,7 @@ ] }, { - "uuid": "43d29b19-1a27-45ad-b064-7bc0e6c7f3d0", + "uuid": "59aa4521-cb99-4846-b03a-bca4bec9fcb6", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -14522,7 +14431,7 @@ ] }, { - "uuid": "eb7ed9d6-3c12-4769-8c83-c5ba071dcb41", + "uuid": "18426564-0cb5-4dd2-8ffa-98547778f542", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -14544,7 +14453,7 @@ ] }, { - "uuid": "34f0c498-889f-476f-a8d2-749fc214ded2", + "uuid": "8a4c2fee-bb8e-42d4-a157-338f51407b70", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -14621,7 +14530,7 @@ ] }, { - "uuid": "6c7ba884-b36d-4c14-a0dd-d6dd23aae849", + "uuid": "e9359353-7e29-4dcc-af4c-a23c1d4b8eb1", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -14648,7 +14557,7 @@ ] }, { - "uuid": "c2d5a6a3-b988-4bd6-902a-4ba100c3f845", + "uuid": "a300108b-7a55-47fb-a59a-03c664ccb67d", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -15070,7 +14979,7 @@ ] }, { - "uuid": "c1a135ee-d065-4262-917b-f5681039f758", + "uuid": "dcd29816-39f7-4411-a206-8ed7ce2d8ba2", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -15087,7 +14996,7 @@ ] }, { - "uuid": "0fff32f0-89cd-4ce0-9279-c150fc3f08d9", + "uuid": "c89175d6-753c-467f-9356-f09b5da48a70", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -15129,7 +15038,7 @@ ] }, { - "uuid": "cf0e8200-aeec-4468-85d5-3199248c9101", + "uuid": "8a0295a9-6ccc-40ba-b009-42b35e905d8d", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -15491,7 +15400,7 @@ ] }, { - "uuid": "0ed6e446-e71f-4a59-9855-d1cda4e2de8f", + "uuid": "f72e6287-52c7-4a0f-bd29-878f98725c16", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -15908,7 +15817,7 @@ ] }, { - "uuid": "e77877d6-8f8a-4ed9-b500-c00adaa41a7d", + "uuid": "649df8fe-161b-43d3-96f3-ccd3314aa5ae", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -16016,16 +15925,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "8bd767cb-653f-499e-83c1-62369e8db95a", + "uuid": "fb45391f-0b08-43b8-9f66-2137d5f02092", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -16097,7 +16001,7 @@ ] }, { - "uuid": "d6a8f0de-e5e5-457d-82e6-14908949d8fa", + "uuid": "b16c1bda-3198-4f50-a872-a72943819a3a", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -16169,7 +16073,7 @@ ] }, { - "uuid": "0245f20c-21cf-462e-8e87-8d95eac2c07c", + "uuid": "76a8ba77-9642-475a-9f72-7156a9e939cd", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -16277,16 +16181,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "a2efa817-5159-4132-8a20-295cb48cceb2", + "uuid": "8f9a35e1-7223-4002-b461-1b450980205e", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -16308,7 +16207,7 @@ ] }, { - "uuid": "8ad7f563-1357-4b69-ac6a-1ac8a7943cb2", + "uuid": "79d9ea47-6727-47ba-abce-9f484659937c", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -16685,7 +16584,7 @@ ] }, { - "uuid": "4826aab4-984a-4360-b569-b8fe21549f03", + "uuid": "a782711f-2bd8-4f77-9655-c73ac567c790", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -16762,7 +16661,7 @@ ] }, { - "uuid": "fc95cc93-5812-4460-b546-9df51d83a9a1", + "uuid": "122512ce-7b3e-4875-8391-20a1fd034862", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -16784,7 +16683,7 @@ ] }, { - "uuid": "4bdd704e-4feb-423e-ae27-d4d8ce60e899", + "uuid": "d7065fe0-4bc4-44f1-a681-9613effb9c9b", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -16897,16 +16796,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "86f38b47-8d89-4658-9080-886659dd1c21", + "uuid": "f99daf6b-909e-453a-bfdf-bafb1046d19a", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -16918,7 +16812,7 @@ ] }, { - "uuid": "21f348ad-12bf-4010-a022-c6d95abe2775", + "uuid": "9fda91a0-4608-4d8c-b4a9-a7af426061ea", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -16995,7 +16889,7 @@ ] }, { - "uuid": "63595753-6d9e-40af-989c-94929b7acea5", + "uuid": "6aba4590-26be-4c17-973d-0884d9c353fe", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -17022,7 +16916,7 @@ ] }, { - "uuid": "3c0cc405-e8aa-42ea-86da-f76e0e84bddf", + "uuid": "207f4ee7-d6df-41a1-aa19-56162525d34e", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -17159,7 +17053,7 @@ ] }, { - "uuid": "ab0e8954-2926-4aed-8a00-60267b6d0da6", + "uuid": "27dda100-cc86-4adc-bc81-d67888db991f", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -17176,7 +17070,7 @@ ] }, { - "uuid": "d0017b38-a10d-455f-afed-d4f7ed02a07d", + "uuid": "4ac8c1b4-bd07-457a-a1cb-a19d87cc6cf2", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -17263,7 +17157,7 @@ ] }, { - "uuid": "0c37a651-c77b-4d4f-b68f-0583e3e7d14a", + "uuid": "4780e49f-8b70-48ef-b9a2-67bab1fc96b0", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -17285,7 +17179,7 @@ ] }, { - "uuid": "e2c34bcd-bc87-43ac-b342-8daeb04ee6c8", + "uuid": "830493fa-b065-402d-8ee3-841fc9990a40", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -17362,7 +17256,7 @@ ] }, { - "uuid": "5b4a2463-ae74-4f30-91e8-5a556477d4c6", + "uuid": "35ec6c05-9774-43ca-88e2-18ed47a5a21c", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -17389,7 +17283,7 @@ ] }, { - "uuid": "a02cebc2-53e3-4376-adbe-edcd06bb3982", + "uuid": "eee8160e-4ee0-4a9b-bde8-4822e0a09ca8", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -17811,7 +17705,7 @@ ] }, { - "uuid": "16a10ab1-70c5-4619-925c-b8d95455810c", + "uuid": "cc71d504-6d18-4cc8-8a40-58a45efd3aad", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -17828,7 +17722,7 @@ ] }, { - "uuid": "aa01312b-1469-4369-b195-aeb54c06926b", + "uuid": "6b0d4285-bbd1-4323-b809-e3249a8b2c4c", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -17870,7 +17764,7 @@ ] }, { - "uuid": "d4f027bb-075a-48eb-a189-1cca85ad7b05", + "uuid": "6d203902-a17c-4cdc-9c10-3e9a613ea4da", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -18232,7 +18126,7 @@ ] }, { - "uuid": "c8580934-8d58-42fb-968d-b154ad2beb6b", + "uuid": "f2dd38cd-41db-4f55-8f37-e292bc6f2471", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -18649,7 +18543,7 @@ ] }, { - "uuid": "c1ef54a4-4ee8-4437-9f1b-45d487a39127", + "uuid": "5b826ea4-f3cb-4439-92ad-684e3ca7ffeb", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -18757,16 +18651,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "4a6a1008-3845-4aa0-8d61-0f470f073646", + "uuid": "90c5bf66-af9b-4957-a75e-08e25e05f32d", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -18838,7 +18727,7 @@ ] }, { - "uuid": "15b71809-9f33-49a7-9b3f-58dd8f11f735", + "uuid": "b3ff9b8d-d832-4c89-829b-b3aeda0a9810", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -18910,7 +18799,7 @@ ] }, { - "uuid": "51535322-3cec-42de-9ab1-bae1f820ece7", + "uuid": "4eb286e3-7307-4927-b97f-81473571b35f", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -19018,16 +18907,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0e942358-7779-4dfc-8d30-d0c60699755d", + "uuid": "604d4498-fd3e-4751-ab95-2ebb59b4f2b0", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -19049,7 +18933,7 @@ ] }, { - "uuid": "e1918235-40cd-42bf-8aab-4c760b6ebfd7", + "uuid": "e04b80e7-2e11-40ae-81b9-9054b9b40bde", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -19426,7 +19310,7 @@ ] }, { - "uuid": "0bc7d478-f7df-45a6-b872-66f01dee6c86", + "uuid": "934f2c3f-3fd6-411d-b07d-3b30b782f4f7", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -19503,7 +19387,7 @@ ] }, { - "uuid": "3112dc9e-13b2-40c1-94fc-f36257c78a60", + "uuid": "475cd2d4-ede6-49b9-9568-8e5ca72142f0", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -19525,7 +19409,7 @@ ] }, { - "uuid": "422bc2e2-0363-4164-ab05-8b4176d7c7d5", + "uuid": "a9d04969-a403-4f9f-8e19-da74e6324aee", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -19638,16 +19522,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "f9a8a39e-a6ee-4a27-95b4-7a21d451d14e", + "uuid": "9f7efe7f-b4a4-4e66-81c8-39d85050a081", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -19659,7 +19538,7 @@ ] }, { - "uuid": "cd04cb02-91d3-497f-85a1-581b62413821", + "uuid": "7c01fd34-2b80-499a-9d52-88d4544500f0", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -19736,7 +19615,7 @@ ] }, { - "uuid": "f8b8caa2-4a7f-45c7-86f0-10f2df8b898a", + "uuid": "51723dd6-2f24-47b1-97ce-fb83d4f9cccc", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -19763,7 +19642,7 @@ ] }, { - "uuid": "915dce07-609c-422d-aa45-ee799e6a70d1", + "uuid": "deb3e8aa-5496-43cc-aece-a7f80786ff64", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -19900,7 +19779,7 @@ ] }, { - "uuid": "51de730b-3a52-4940-b492-8f7e3d9e10c6", + "uuid": "9ab2997b-1a98-48a9-9883-b163ae317de8", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -19917,7 +19796,7 @@ ] }, { - "uuid": "8d23558f-bc1e-483c-a0fb-255dd7cc0bf9", + "uuid": "b3c3ad0b-efb3-443a-b076-c3e9c249166d", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -20004,7 +19883,7 @@ ] }, { - "uuid": "ebb2b789-a457-4358-84ee-debb7f4b96ff", + "uuid": "6d6ed1e7-5fdb-4a9f-a55b-cb6d8727a968", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -20026,7 +19905,7 @@ ] }, { - "uuid": "d78056b7-6f8e-404d-bef1-bee6f05138ca", + "uuid": "c1b33bd4-f911-43a9-b1af-39155af6e7ff", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -20103,7 +19982,7 @@ ] }, { - "uuid": "0f51ce84-4cea-4b9b-bfb3-3fc5c928da91", + "uuid": "4501d1e4-9913-4447-aeb3-dbf4bb95b905", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -20130,7 +20009,7 @@ ] }, { - "uuid": "9719fb61-3f3f-41a4-8f58-7fc5a829a8fb", + "uuid": "df0fa12b-487a-4a2f-aabc-fd466b808ca8", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -20552,7 +20431,7 @@ ] }, { - "uuid": "dc77337e-a57a-470c-af08-ec48dc0f1b21", + "uuid": "5d161c0e-89f0-450c-bc6b-c9abb14c96b1", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -20569,7 +20448,7 @@ ] }, { - "uuid": "dad48e5f-d60d-4347-85c0-46c5012754e4", + "uuid": "695492ad-46b7-42e0-ab8a-f3ab3eeb2e4c", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -20611,7 +20490,7 @@ ] }, { - "uuid": "98d7595d-126e-4e31-a606-928db515286c", + "uuid": "399e3ba4-1d72-406f-830f-3460b6c1e605", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -20973,7 +20852,7 @@ ] }, { - "uuid": "6201a7c8-da18-454e-975e-f1d00dbf3b97", + "uuid": "84723c4d-b28e-429e-a818-0cdc99e55d8f", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -21390,7 +21269,7 @@ ] }, { - "uuid": "727ef356-1c8e-4f45-919f-d5bb3741f102", + "uuid": "40d5192a-baa1-4b41-b82b-804ba3d1b9c3", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -21498,11 +21377,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } diff --git a/component-definitions/rhel9/rhel9-hipaa-required/component-definition.json b/component-definitions/rhel9/rhel9-hipaa-required/component-definition.json index dc9f40419..cc04a86ed 100644 --- a/component-definitions/rhel9/rhel9-hipaa-required/component-definition.json +++ b/component-definitions/rhel9/rhel9-hipaa-required/component-definition.json @@ -3,8 +3,8 @@ "uuid": "4064fc7a-c0c8-4e25-8885-112e43231ce0", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-09-26T16:24:28.019729+08:00", - "version": "1.2", + "last-modified": "2026-03-27T01:27:50.671441+00:00", + "version": "1.3", "oscal-version": "1.1.3" }, "components": [ @@ -1658,46 +1658,34 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_127" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" } ], "control-implementations": [ { - "uuid": "c1128f43-5965-4f85-9daa-8f73849f953b", + "uuid": "fd0c0376-bf60-4ebb-9978-77ff93130af1", "source": "trestle://profiles/rhel9-hipaa-required/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -1747,7 +1735,7 @@ ], "implemented-requirements": [ { - "uuid": "765032ef-330b-4ee1-a119-f5975f38ef7e", + "uuid": "5de9c6b5-3545-4812-b431-bd1c1eb9ceff", "control-id": "hipaa_164-308.a.1.ii.b", "description": "No notes for control-id 164.308(a)(1)(ii)(B).", "props": [ @@ -1829,7 +1817,7 @@ ] }, { - "uuid": "954f4c97-bdba-4dc0-980b-d11921f6692e", + "uuid": "017bf4b0-95aa-4bd9-ae73-88550f8fb31a", "control-id": "hipaa_164-308.a.1.ii.d", "description": "No notes for control-id 164.308(a)(1)(ii)(D).", "props": [ @@ -2301,7 +2289,7 @@ ] }, { - "uuid": "56b778dc-d2c6-4493-8527-765f7afe502f", + "uuid": "ea237381-75d8-468c-907f-7c026c7fad88", "control-id": "hipaa_164-308.a.3.ii.a", "description": "No notes for control-id 164.308(a)(3)(ii)(A).", "props": [ @@ -2668,7 +2656,7 @@ ] }, { - "uuid": "e6e2de17-fad5-44da-b729-ad2a1ccf7c41", + "uuid": "15e3ecef-7904-48da-a860-6b7018ea3dc1", "control-id": "hipaa_164-308.a.6.ii", "description": "No notes for control-id 164.308(a)(6)(ii).", "props": [ @@ -2690,7 +2678,7 @@ ] }, { - "uuid": "82dab16a-ef14-46b6-8104-63ba0023d448", + "uuid": "17dc3441-2629-434f-806d-bc2ff14b23a3", "control-id": "hipaa_164-308.a.7.ii.a", "description": "No notes for control-id 164.308(a)(7)(ii)(A).", "props": [ @@ -2767,7 +2755,7 @@ ] }, { - "uuid": "1ef86e41-ca89-4e79-a759-77d0e9a3d591", + "uuid": "5b96e711-35d0-4853-9a52-51bc2a849b36", "control-id": "hipaa_164-308.b.3", "description": "No notes for control-id 164.308(b)(3).", "props": [ @@ -2875,16 +2863,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "20916c86-817b-4208-81a2-0f63c878df4b", + "uuid": "bdebec29-da75-4e01-879f-2e2af38f104b", "control-id": "hipaa_164-312.a.2.i", "description": "No notes for control-id 164.312(a)(2)(i).", "props": [ @@ -3241,7 +3224,7 @@ ] }, { - "uuid": "6ce14f26-34bb-4999-97dc-53645d4ffcdf", + "uuid": "6426ba40-9691-4df2-8bfe-6cb91ba2f53c", "control-id": "hipaa_164-312.a.2.ii", "description": "No notes for control-id 164.312(a)(2)(ii).", "props": [ @@ -3253,7 +3236,7 @@ ] }, { - "uuid": "10d1a4f4-a7a5-4c87-919b-3e12fcad8408", + "uuid": "c7e82721-9ed1-4020-a6b0-08a0443bc4f7", "control-id": "hipaa_164-314.a.2.i.c", "description": "No notes for control-id 164.314(a)(2)(i)(C).", "props": [ @@ -3275,7 +3258,7 @@ ] }, { - "uuid": "d6569464-3972-47fd-a5e2-21cf9219a09d", + "uuid": "5e891ce6-d4df-445a-b584-4d5521ee7735", "control-id": "hipaa_164-314.a.2.iii", "description": "No notes for control-id 164.314(a)(2)(iii).", "props": [ @@ -3297,7 +3280,7 @@ ] }, { - "uuid": "312f1273-ae5f-438a-8a35-2b4b23276f92", + "uuid": "98364286-dc0d-49dd-92ae-24ee33179701", "control-id": "hipaa_164-314.b.2.i", "description": "No notes for control-id 164.314(b)(2)(i).", "props": [ @@ -3314,7 +3297,7 @@ ] }, { - "uuid": "e8e977b8-f792-4dd2-ad7a-be56cf71eed3", + "uuid": "36e1f422-82ac-4534-8e7b-0b3830ff67e6", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -3336,7 +3319,7 @@ ] }, { - "uuid": "b2056824-4eef-4e30-a3ff-73d9f720095f", + "uuid": "bddc7001-f5c3-44bc-8663-899824382e84", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -3353,7 +3336,7 @@ ] }, { - "uuid": "98e80e72-3dca-4d30-9575-a2835fb3415b", + "uuid": "f087f45b-b512-4f4a-a577-a162bc2f53e3", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -3430,7 +3413,7 @@ ] }, { - "uuid": "c09b03fa-3360-4c4a-9aa8-e39eedf30df9", + "uuid": "f6b10140-af43-4856-9e7c-02e3f9572448", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -3507,7 +3490,7 @@ ] }, { - "uuid": "bc0f9e47-d1d9-417c-9536-1d382d9a0b14", + "uuid": "89c6dfe0-0155-4992-8e7f-09649b4a4d61", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -3584,7 +3567,7 @@ ] }, { - "uuid": "6a71d6d8-84f1-4be8-a5d7-057e9ca27c46", + "uuid": "6cb42dea-3fd2-485f-a0e4-1a5eb957486d", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -3816,7 +3799,7 @@ ] }, { - "uuid": "2795dc5c-d66a-40a5-8d31-6ee1a7db6a25", + "uuid": "e43fdb28-2343-4b4f-a31f-5ce7cd62fc12", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -3918,7 +3901,7 @@ ] }, { - "uuid": "f502683e-6ff6-4c7f-8cda-b69fd85be9b2", + "uuid": "609e7c26-d260-41a9-9a2a-424bc06683ee", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -3935,7 +3918,7 @@ ] }, { - "uuid": "1794000d-311f-45ef-aa53-9f2059f68c88", + "uuid": "324ef2c5-f4dc-4547-96a0-6ce640a1b1ee", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -3962,7 +3945,7 @@ ] }, { - "uuid": "4236f8e1-645f-491a-97ef-0cd7cbe13e10", + "uuid": "73f87794-52aa-45c2-9c58-2bfc14e5d7a2", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -4004,7 +3987,7 @@ ] }, { - "uuid": "469af4ef-02bb-4c02-a5fa-76fb3f708544", + "uuid": "251d63b3-4ed7-4893-80e2-bc9e34b0f2d4", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -4046,7 +4029,7 @@ ] }, { - "uuid": "e75d5b8b-d7ea-48c3-afac-8e18399d40b5", + "uuid": "c8d3f717-2920-4be9-9105-d148d1809159", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -4154,16 +4137,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "458ed6d3-c79c-4b0e-a97b-aa2d76ff3b65", + "uuid": "50047706-4a67-4a98-9030-465ea3787537", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -4235,7 +4213,7 @@ ] }, { - "uuid": "f6ab8da2-675b-498b-b950-54f27accc53b", + "uuid": "bcbde377-1a54-45e9-b65e-5f3399258f2c", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -4307,7 +4285,7 @@ ] }, { - "uuid": "a93741ca-9035-455f-b0c7-0d31a31119a2", + "uuid": "98dc8073-010f-4146-8f2a-08908a25d1b9", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -4415,16 +4393,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "fa9e993c-16ce-4913-ac8b-83518841acf8", + "uuid": "a4db5f68-a3af-478a-9b11-66b74e58f9ea", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -4446,7 +4419,7 @@ ] }, { - "uuid": "5712389b-f33b-41ad-b8f8-1cc1e73b7e60", + "uuid": "5e812404-8e3f-417c-b324-a9df497d8821", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -4823,7 +4796,7 @@ ] }, { - "uuid": "fd48b6ca-4cd0-4889-bccb-8f4d3844530a", + "uuid": "772adfaf-62e8-4dd9-b687-7964b20f43b8", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -4900,7 +4873,7 @@ ] }, { - "uuid": "ae5066a3-0e72-40f7-9f7d-4f240d9270d8", + "uuid": "b20c0b70-dc44-4f22-87cd-a1398e5c58f9", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -4922,7 +4895,7 @@ ] }, { - "uuid": "ec81da99-54d3-4d5f-8bdd-317b8b9fdfb3", + "uuid": "f65a7430-67aa-4eed-b48c-9b21963cccd1", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -5035,16 +5008,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "625edddf-205b-43af-87d5-c9ef3ed55dc5", + "uuid": "38169166-3f0c-413a-92db-2451e1631779", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -5056,7 +5024,7 @@ ] }, { - "uuid": "04087bf4-a32d-4993-936c-7c7bbcdbe686", + "uuid": "5f899025-169a-4af3-bb9f-2b5983706a56", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -5133,7 +5101,7 @@ ] }, { - "uuid": "ea40810b-f243-41dd-9e3e-07293d8833db", + "uuid": "d4809a76-a27a-472d-b4ab-711bb7481b8c", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -5160,7 +5128,7 @@ ] }, { - "uuid": "45ba526e-0faf-41ff-b8e4-a14b1e63de28", + "uuid": "7ecd1093-0439-4621-bb89-9a3e8db863ad", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -5297,7 +5265,7 @@ ] }, { - "uuid": "681f8278-9bf8-4c8c-8ad1-d84bc06d238f", + "uuid": "a4732beb-7e2f-4273-934f-d8b47c0a09f2", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -5314,7 +5282,7 @@ ] }, { - "uuid": "9e4edf0b-6de7-48b5-9e51-f817326c6614", + "uuid": "8769e452-35f3-4444-ac2e-f7403b014481", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -5401,7 +5369,7 @@ ] }, { - "uuid": "c53def2b-689b-4e73-a501-f302ec7d4ac5", + "uuid": "d26fae0e-3da2-4c0d-9d2f-4909f2c1c85b", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -5423,7 +5391,7 @@ ] }, { - "uuid": "de23677e-e904-4f33-812a-7fa425bb16d3", + "uuid": "a3505284-eae6-4203-8035-d084f38cc16d", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -5500,7 +5468,7 @@ ] }, { - "uuid": "f00c265f-ddbd-4421-a8e9-fbbd084b5ad4", + "uuid": "5e80b84b-acd1-44c7-9fec-39a23871cd70", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -5527,7 +5495,7 @@ ] }, { - "uuid": "0077d70f-ea0a-42e4-9d51-fea21f10d449", + "uuid": "429322bd-bac2-4f68-93a9-782bc85c886d", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -5949,7 +5917,7 @@ ] }, { - "uuid": "92ee7754-c540-4d49-9936-97aceb4a238c", + "uuid": "e38488a1-7d75-4ab4-af35-1a5331b530a1", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -5966,7 +5934,7 @@ ] }, { - "uuid": "46f57295-e61e-4033-8a63-483b4fcc7c2b", + "uuid": "c48ed573-72fb-4ec7-9004-c1f977c90e6f", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -6008,7 +5976,7 @@ ] }, { - "uuid": "081b076a-1676-4beb-93f5-fa34557e68fd", + "uuid": "08bcf375-49e5-4adf-a746-1b9b60760c4b", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -6370,7 +6338,7 @@ ] }, { - "uuid": "a755f6c0-4cb9-4e39-b68d-d40622c1baa5", + "uuid": "6d106a6a-efe1-4425-a7c1-2760d184d9d2", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -6787,7 +6755,7 @@ ] }, { - "uuid": "224e2d49-48c4-4c8d-9da7-5c72962b160c", + "uuid": "9e9d1c18-7a8a-4c43-abe7-d24a544d1ac5", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -6895,16 +6863,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "194dceeb-af62-44b0-95b2-144c96dadd47", + "uuid": "7c258078-a6ba-4f9d-963b-6c9f66a70854", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -6926,7 +6889,7 @@ ] }, { - "uuid": "31b4a573-f4f2-4c3a-b4b6-d2bbafb3379b", + "uuid": "b50deeb9-c3f0-4e03-906f-a75ff932dad6", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -6943,7 +6906,7 @@ ] }, { - "uuid": "b5b222d9-9aa9-4904-b5dc-06c895e24b5c", + "uuid": "b1cdb104-ac06-477d-a367-d70534647ff5", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -7020,7 +6983,7 @@ ] }, { - "uuid": "81a28106-f725-4a90-bee4-1a2e3b5a4c03", + "uuid": "22bcc6a0-de04-49a7-9d41-425f6c541c98", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -7097,7 +7060,7 @@ ] }, { - "uuid": "debfffa2-a853-46af-b22f-40c270ccc567", + "uuid": "407cabb4-57b9-492b-8ec4-683aa8e73bdc", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -7174,7 +7137,7 @@ ] }, { - "uuid": "5dc2f3fa-405d-4e4f-a638-43bbf0561b34", + "uuid": "e351d2ef-9491-4c49-9c52-5c1ad6c22afe", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -7406,7 +7369,7 @@ ] }, { - "uuid": "0ff285f1-7919-4e75-99c6-fd7d51e98a62", + "uuid": "2cd0f6a0-02ff-474c-bae0-3859b2d8b2ce", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -7508,7 +7471,7 @@ ] }, { - "uuid": "7b6065e2-8103-4e40-b87e-b0b8024f33ce", + "uuid": "760a6f39-14bc-4e57-9165-082ecf4c6056", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -7525,7 +7488,7 @@ ] }, { - "uuid": "a4b1af08-c6de-41f6-8183-98117b75ca69", + "uuid": "5bfcc918-ef00-4c52-abc8-1a243869a845", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -7552,7 +7515,7 @@ ] }, { - "uuid": "001405f7-ac77-4ec1-8377-cd254e2173d3", + "uuid": "905f3825-22e3-4d59-a4de-97229327a4b3", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -7594,7 +7557,7 @@ ] }, { - "uuid": "f9ef165f-a861-4e62-a772-b876ce98a834", + "uuid": "e7d998b7-9833-4b2e-b993-230dfe37752e", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -7636,7 +7599,7 @@ ] }, { - "uuid": "daed282a-11ac-4d16-91f1-de8f1191b37b", + "uuid": "b996e253-7874-4698-a5f5-afd9cf321559", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -7744,16 +7707,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "4824790a-3399-4d76-8b4d-ba52ad9b30b6", + "uuid": "3381b958-5dbc-49ad-af18-6bddd614cd60", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -7825,7 +7783,7 @@ ] }, { - "uuid": "b3595a01-494b-4cfd-9944-12f0d8d8aa13", + "uuid": "707e502f-eb42-422c-b4b6-c4e099a383c1", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -7897,7 +7855,7 @@ ] }, { - "uuid": "b4b14c4e-f935-4747-b24c-46cf9086a8f0", + "uuid": "c61edbe9-8a52-432e-a5e4-4cc55e9caa1d", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -8005,16 +7963,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "27c563d4-22d1-48eb-9c8e-b31165288318", + "uuid": "9a6bf819-64ba-4788-8487-9bd3e494dcc3", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -8036,7 +7989,7 @@ ] }, { - "uuid": "5dc70492-88d2-45ff-8e04-1c2e1720bdb1", + "uuid": "16a5613f-6889-4513-99c6-5bff50b12aa9", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -8413,7 +8366,7 @@ ] }, { - "uuid": "ca7b962a-66ba-43c2-92c2-36621573b78c", + "uuid": "308f1c5d-8550-42ce-ab61-28de48f9512b", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -8490,7 +8443,7 @@ ] }, { - "uuid": "01bd7448-00e6-4bb7-ba36-ecd10004fe31", + "uuid": "1cea5217-af34-47df-965c-2a22efe87d31", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -8512,7 +8465,7 @@ ] }, { - "uuid": "3c3ce123-19c8-48cf-9c2a-0b345db576d6", + "uuid": "7e7c71b0-a140-46dd-897a-aa63cbe2c9d5", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -8625,16 +8578,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ef8bf981-ccfe-4ad4-98e1-ae6b99e90c33", + "uuid": "4048411c-1ac5-4069-84cb-7aae500aee90", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -8646,7 +8594,7 @@ ] }, { - "uuid": "022cc90d-f8ce-4dd0-985c-69b2c9cc1999", + "uuid": "501263d5-b501-4a87-b8fd-0a8f0878a69a", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -8723,7 +8671,7 @@ ] }, { - "uuid": "3ea2a308-096d-467f-a642-a13c43212762", + "uuid": "8ffead60-cd9b-4e31-9e45-cec37d573b46", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -8750,7 +8698,7 @@ ] }, { - "uuid": "b8bdd15a-c6ed-4d8f-b233-8c0b0a74e8ba", + "uuid": "a7e4484d-743c-4a4a-8109-6f567992504a", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -8887,7 +8835,7 @@ ] }, { - "uuid": "7ff327c7-1dc7-4358-b6b1-e92e3c69b391", + "uuid": "6f157a76-af8f-4071-9b62-b3a893293862", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -8904,7 +8852,7 @@ ] }, { - "uuid": "2d41b591-b2b9-4299-acfd-522649c37af1", + "uuid": "212c4fd7-f182-448f-9932-f894adfb2e75", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -8991,7 +8939,7 @@ ] }, { - "uuid": "1f8c87a7-0972-40f2-8cb2-caaee353b233", + "uuid": "58a00013-31ae-4a52-80ae-0951bff8e502", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -9013,7 +8961,7 @@ ] }, { - "uuid": "e92ed13a-51cb-4888-9602-a41469b6c095", + "uuid": "d242887a-0b41-4021-97fe-bede6228f5f1", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -9090,7 +9038,7 @@ ] }, { - "uuid": "3def309b-899f-490b-b83c-d213cf374920", + "uuid": "0288e5d0-5d0d-404b-abe3-464927e1ea8a", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -9117,7 +9065,7 @@ ] }, { - "uuid": "dfff6228-ede8-4db5-97f8-a29bc3d9edd4", + "uuid": "c322303c-342e-4ab6-b326-9a7f614d1daa", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -9539,7 +9487,7 @@ ] }, { - "uuid": "c481f2bf-8a12-4438-9165-c611b7456786", + "uuid": "9c3d146b-1d99-4df7-bfa8-c30743f05587", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -9556,7 +9504,7 @@ ] }, { - "uuid": "6b858ac6-967c-49f7-adb1-071ed5b6ee82", + "uuid": "fe3d9511-e100-4b54-a18c-62218f5537c1", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -9598,7 +9546,7 @@ ] }, { - "uuid": "917a4f61-850b-4009-910d-5e5d9bdd044c", + "uuid": "5a22e7ec-6595-4fdb-8790-e38b1ffc39ef", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -9960,7 +9908,7 @@ ] }, { - "uuid": "e394b550-2a95-4115-98e9-252a41d29c25", + "uuid": "dd39abb9-ea16-4084-813c-c6b6bdf51fad", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -10377,7 +10325,7 @@ ] }, { - "uuid": "a1f72a68-3b49-4cbe-8a0c-96fe5d9e832c", + "uuid": "efff6f65-7960-4d8b-af1a-b36585d507aa", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -10485,16 +10433,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "d4ad296b-2a0d-41d1-8e0a-eb3a86e623ab", + "uuid": "37a33aa7-0b9b-4b14-9980-bed4046492e1", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -10566,7 +10509,7 @@ ] }, { - "uuid": "c1ea6a3d-035b-4957-b337-60907072abcb", + "uuid": "0f2ea7a7-855a-457a-b781-60322f23749d", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -10638,7 +10581,7 @@ ] }, { - "uuid": "4564f1ba-dce4-4a0f-8a3c-1f38da00d18b", + "uuid": "c7feeea6-cbd3-4dd8-962b-62e1c68276a9", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -10746,16 +10689,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ff08cdc5-2ef9-492f-8f47-02240256414b", + "uuid": "dd141b5b-e01f-4305-b683-b98db401860f", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -10777,7 +10715,7 @@ ] }, { - "uuid": "739443c4-f8f1-43b2-938d-62275e181205", + "uuid": "e1cd0289-c014-4175-848b-465dafdcb72e", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -11154,7 +11092,7 @@ ] }, { - "uuid": "0e22342d-ae77-4086-9ffc-941b90de6fc4", + "uuid": "be7d7bc5-01b7-4228-baa4-760b80141586", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -11231,7 +11169,7 @@ ] }, { - "uuid": "ce3ebf3b-8278-4772-8d68-ec7738e72f80", + "uuid": "a4510569-23fd-4846-8dc0-1e5779cae975", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -11253,7 +11191,7 @@ ] }, { - "uuid": "6142065d-8bd0-4040-aad2-385e53ab590a", + "uuid": "3e37f474-6183-4323-a7ba-8721c408d8c7", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -11366,16 +11304,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "d2e3dd9d-c9c8-4348-824d-72e39862e298", + "uuid": "2a16b1dd-6c1c-43f9-a8fb-1571288013f7", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -11387,7 +11320,7 @@ ] }, { - "uuid": "a828295f-e4e2-4d91-a5d2-3bb17cec138d", + "uuid": "eb479fc6-de48-4e1d-8b8b-67aea807d36a", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -11464,7 +11397,7 @@ ] }, { - "uuid": "cec88e9c-1902-4453-a293-492071791d6c", + "uuid": "4ce84d4e-2d29-4d86-a98c-0d063d6619a3", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -11491,7 +11424,7 @@ ] }, { - "uuid": "b917e645-2d13-45d0-ac5f-89442211d90c", + "uuid": "e5b554fb-08e0-45a0-b7e8-637744297c81", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -11628,7 +11561,7 @@ ] }, { - "uuid": "a8e856ee-2e7b-4fcb-b082-87e2a3aa258e", + "uuid": "e5788c5b-6cad-4811-a070-89f0397e6253", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -11645,7 +11578,7 @@ ] }, { - "uuid": "0a1fd7c0-c705-412d-a85c-49b0cdd5b144", + "uuid": "3c71dbb2-ac04-412f-a521-ed48e3e29c07", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -11732,7 +11665,7 @@ ] }, { - "uuid": "1833b0e6-899f-4906-a5ed-48b96ece8567", + "uuid": "f83cc23c-5792-4d47-9711-c78587cc562c", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -11754,7 +11687,7 @@ ] }, { - "uuid": "e0ea07be-444b-4d72-9adb-ea154dc90782", + "uuid": "86631c61-a0bb-4b6b-9ac1-e4d0472fde64", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -11831,7 +11764,7 @@ ] }, { - "uuid": "aaecca0e-6798-48a9-8757-996d5e227ca8", + "uuid": "5e267443-1aec-4332-a32d-3b89e25c82af", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -11858,7 +11791,7 @@ ] }, { - "uuid": "838e8cc8-7301-4f98-8c37-0aca87cc3751", + "uuid": "cfb85d13-5b27-4609-8557-abe7cfd6d0f6", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -12280,7 +12213,7 @@ ] }, { - "uuid": "7cc73217-20f3-4269-ae6a-0b60a67f2d87", + "uuid": "5b26ad07-923e-4d1d-a4ab-0bc3cac05360", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -12297,7 +12230,7 @@ ] }, { - "uuid": "20da875f-1a4c-4742-940d-26e58e417fe8", + "uuid": "ec2a6bc5-ef97-4194-9207-376b44e1aa9f", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -12339,7 +12272,7 @@ ] }, { - "uuid": "c0dabce3-1b7b-426f-8470-9d00c2a4ed85", + "uuid": "e9a12a37-56b7-47b3-ad7d-07246dc6a6f0", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -12701,7 +12634,7 @@ ] }, { - "uuid": "2e0a6dbe-527f-4030-81b5-3f828631914d", + "uuid": "b5afd8ff-347f-49de-bc6f-37a7c11e4bcc", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -13118,7 +13051,7 @@ ] }, { - "uuid": "19d5bf3e-4b6c-4599-8bc2-7aa33cfe5559", + "uuid": "dde4505d-3bc4-4181-b63d-b9bea17f1d43", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -13226,11 +13159,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } @@ -16424,82 +16352,58 @@ "value": "Configure System Cryptography Policy", "remarks": "rule_set_127" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_128" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_128" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rsh_trust_files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove Rsh Trust Files", - "remarks": "rule_set_130" + "remarks": "rule_set_129" } ], "control-implementations": [ { - "uuid": "3db5f56f-f244-4cb4-8d7d-c1ecdc58c153", + "uuid": "8fc1c36a-b355-49b2-bceb-6262a11d5689", "source": "trestle://profiles/rhel9-hipaa-required/profile.json", "description": "Control implementation for hipaa", "props": [ @@ -16549,7 +16453,7 @@ ], "implemented-requirements": [ { - "uuid": "7f9d6e71-8471-42a2-bca8-11bfb6239a77", + "uuid": "b9ae3e6d-f643-451a-baff-41f3e3e7c508", "control-id": "hipaa_164-308.a.1.ii.b", "description": "No notes for control-id 164.308(a)(1)(ii)(B).", "props": [ @@ -16631,7 +16535,7 @@ ] }, { - "uuid": "63330110-d904-4653-9da2-632dd377e3cf", + "uuid": "47953d27-1e72-4b79-89db-8289c845a664", "control-id": "hipaa_164-308.a.1.ii.d", "description": "No notes for control-id 164.308(a)(1)(ii)(D).", "props": [ @@ -17103,7 +17007,7 @@ ] }, { - "uuid": "812380cb-5659-403e-99ea-4e260fc5fe1e", + "uuid": "666858d0-d123-462e-b178-bbbc4ba6f519", "control-id": "hipaa_164-308.a.3.ii.a", "description": "No notes for control-id 164.308(a)(3)(ii)(A).", "props": [ @@ -17470,7 +17374,7 @@ ] }, { - "uuid": "57ecb992-218a-4129-875b-b7ad761a6a08", + "uuid": "b5d92592-eefd-402f-a689-29515eea2a30", "control-id": "hipaa_164-308.a.6.ii", "description": "No notes for control-id 164.308(a)(6)(ii).", "props": [ @@ -17492,7 +17396,7 @@ ] }, { - "uuid": "394bce84-c319-4c2d-a2ce-3cedafd7e77b", + "uuid": "89d10511-0ad1-4d66-8f09-b74b18dbae19", "control-id": "hipaa_164-308.a.7.ii.a", "description": "No notes for control-id 164.308(a)(7)(ii)(A).", "props": [ @@ -17569,7 +17473,7 @@ ] }, { - "uuid": "e53846b4-ab03-490e-8847-4988932b5ab9", + "uuid": "981f2c80-dc55-496c-8380-e4add6c8db88", "control-id": "hipaa_164-308.b.3", "description": "No notes for control-id 164.308(b)(3).", "props": [ @@ -17677,16 +17581,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "ba416857-40e8-421c-969d-958fd601db16", + "uuid": "153f50fd-1ed9-4818-9327-1bfea04e3097", "control-id": "hipaa_164-312.a.2.i", "description": "No notes for control-id 164.312(a)(2)(i).", "props": [ @@ -18043,7 +17942,7 @@ ] }, { - "uuid": "497ca9e0-8002-47b6-b2e6-0b47df8a237d", + "uuid": "7473f7d4-e9ac-4484-be8f-56f095eb9d5d", "control-id": "hipaa_164-312.a.2.ii", "description": "No notes for control-id 164.312(a)(2)(ii).", "props": [ @@ -18055,7 +17954,7 @@ ] }, { - "uuid": "0742384c-39b2-4236-a7dd-17ec8a9762d4", + "uuid": "e8d07be8-061d-4328-aebd-8c793104c53f", "control-id": "hipaa_164-314.a.2.i.c", "description": "No notes for control-id 164.314(a)(2)(i)(C).", "props": [ @@ -18077,7 +17976,7 @@ ] }, { - "uuid": "4b81db0a-e142-455c-a207-93e718d95184", + "uuid": "5ba69d71-22c4-4728-919d-625c37b42f2b", "control-id": "hipaa_164-314.a.2.iii", "description": "No notes for control-id 164.314(a)(2)(iii).", "props": [ @@ -18099,7 +17998,7 @@ ] }, { - "uuid": "e767cbc2-ab44-450c-8cbc-60f3b140e760", + "uuid": "7e78d9f1-ca2e-446a-a805-139691e4e2b0", "control-id": "hipaa_164-314.b.2.i", "description": "No notes for control-id 164.314(b)(2)(i).", "props": [ @@ -18116,7 +18015,7 @@ ] }, { - "uuid": "bb793400-14ed-49df-85d3-16b57c184a84", + "uuid": "50ff90f8-484e-4970-af2f-34bfb7509921", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -18138,7 +18037,7 @@ ] }, { - "uuid": "7a46136b-4a32-4cfc-997b-b504248829be", + "uuid": "8b075d3a-a597-447b-ab84-069783f6f915", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -18155,7 +18054,7 @@ ] }, { - "uuid": "808f0895-453e-41b2-9de2-366767188661", + "uuid": "077fbcf9-8e77-481e-9bd0-9689387cb3e3", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -18232,7 +18131,7 @@ ] }, { - "uuid": "088047c4-e7bc-4c10-a77a-1948e0c2a0e8", + "uuid": "b735ec8f-ab68-478b-afbe-a9d2edbf7c54", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -18309,7 +18208,7 @@ ] }, { - "uuid": "59c0a0c6-53ab-41ff-8e53-49e069edec86", + "uuid": "f58ecd35-6494-486f-90b5-491156ec90e3", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -18386,7 +18285,7 @@ ] }, { - "uuid": "92e6905b-fef2-4b03-ba13-00d22c570f64", + "uuid": "4aad91c5-1e22-41a9-a241-37100468b825", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -18618,7 +18517,7 @@ ] }, { - "uuid": "878d2410-29cb-4657-bfc4-8d93e0e5d3b0", + "uuid": "829f00d9-ff7b-4f0a-953d-2e95e2340138", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -18720,7 +18619,7 @@ ] }, { - "uuid": "6d9b00ac-86b6-4bee-8f17-a3f9f4fe5972", + "uuid": "0bc976dc-5b9e-41d7-b85c-fe6feda31714", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -18737,7 +18636,7 @@ ] }, { - "uuid": "b84d7434-fd8b-49cd-8be1-1b95a0ba97f5", + "uuid": "ee59d41e-6f77-46e9-bb1e-e3c4f2e4c1fc", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -18764,7 +18663,7 @@ ] }, { - "uuid": "450ead28-45cf-4a59-b260-f380ef292776", + "uuid": "730bfeb8-d08b-4af4-b64c-c7af2db3a856", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -18806,7 +18705,7 @@ ] }, { - "uuid": "f07a760e-f1cf-4a89-a877-081b4e673c55", + "uuid": "33588dce-366e-4a77-859b-5e177dee4d01", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -18848,7 +18747,7 @@ ] }, { - "uuid": "ad4ecfec-f004-4996-a4dc-343cd5e90908", + "uuid": "afcdfce8-2357-4d0d-bd28-05cd4c4c6793", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -18956,16 +18855,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "cd273fbe-4159-4f66-b405-b02b904f2e38", + "uuid": "c353a994-fb76-429a-ae1f-9aedeb2f4a19", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -19037,7 +18931,7 @@ ] }, { - "uuid": "f29cd435-4806-4810-b5ef-e6f52da0c9cd", + "uuid": "490625d5-b05c-476b-9aaf-55a70c26d8d0", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -19109,7 +19003,7 @@ ] }, { - "uuid": "af7f82a5-e385-444b-a90c-66273978311e", + "uuid": "03979fb2-1579-4922-ad1f-2de9deb124f9", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -19217,16 +19111,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "574940ef-02cc-4d99-8e2e-2f6678a5a78f", + "uuid": "12c16706-098f-4031-8544-d52e90d706f5", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -19248,7 +19137,7 @@ ] }, { - "uuid": "53629154-95d3-4820-8d9d-852430fd69fb", + "uuid": "b9ae6a88-fd84-4740-9913-8bd0cf805f9c", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -19625,7 +19514,7 @@ ] }, { - "uuid": "be32e9fe-7116-4d2e-9520-f475fbbaf61f", + "uuid": "4e85c7d4-6b57-4121-88e3-1d6c8cbcb710", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -19702,7 +19591,7 @@ ] }, { - "uuid": "404f2661-7ad0-408e-9df6-be3f4972f6a0", + "uuid": "fae331f1-b74a-4632-95e1-06c4c472f77c", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -19724,7 +19613,7 @@ ] }, { - "uuid": "370f8bef-1eb5-435d-a55e-de1ee501baad", + "uuid": "af31abbc-ff00-41a8-8185-79c84139e00d", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -19837,16 +19726,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "7df49782-6c04-4cb2-957a-800d30313585", + "uuid": "8d3f2db4-4a0b-4c23-a0e5-5458d69b31da", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -19858,7 +19742,7 @@ ] }, { - "uuid": "baba8922-64b8-4966-bc2b-ce65c959464d", + "uuid": "7485edaf-9392-4da3-b218-5af02db5eda1", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -19935,7 +19819,7 @@ ] }, { - "uuid": "26782a91-ddc1-431e-9d19-99e6a983b439", + "uuid": "55285676-2582-412d-b830-490baf0a3241", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -19962,7 +19846,7 @@ ] }, { - "uuid": "652c8298-6f1c-4473-b8cd-5d0e96a66b6c", + "uuid": "4660c1e1-227f-4a46-a4b0-34a06f3ce437", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -20099,7 +19983,7 @@ ] }, { - "uuid": "a5e242d7-3e46-4317-a622-8c97f582f473", + "uuid": "fde422cb-73e2-4e9a-8c16-baf0077de2c1", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -20116,7 +20000,7 @@ ] }, { - "uuid": "f11b3d7e-1125-4099-8b22-f1feab70b118", + "uuid": "8396fbd1-e413-44a9-8fff-f5573928d0b9", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -20203,7 +20087,7 @@ ] }, { - "uuid": "e1f36285-0558-4bac-b194-439b098fb9bd", + "uuid": "83ddc3e2-13a3-476d-8c89-e8148996b035", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -20225,7 +20109,7 @@ ] }, { - "uuid": "3cb727fa-3ac0-4e04-a6e8-fd7c2f136b8c", + "uuid": "9f863a44-8abb-4d82-8d2d-4ff3d96356c5", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -20302,7 +20186,7 @@ ] }, { - "uuid": "c5a83ea0-ccf5-4838-98ac-2c1a4f6a26f0", + "uuid": "ab9d538e-1172-4f51-b890-2215b11b75e8", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -20329,7 +20213,7 @@ ] }, { - "uuid": "b19304de-722e-4187-b0a5-cb95ef9df664", + "uuid": "a27963b8-368c-4942-8a6a-c78d6c052abd", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -20751,7 +20635,7 @@ ] }, { - "uuid": "8efc841e-ff69-40a3-841c-1b46566a36dc", + "uuid": "da8b0c6c-1391-4dbe-836e-deecb07e6ca0", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -20768,7 +20652,7 @@ ] }, { - "uuid": "896ce13e-47a8-46ff-b731-18bee811a803", + "uuid": "9ace29ce-5611-4f7d-acd4-62ea062481e1", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -20810,7 +20694,7 @@ ] }, { - "uuid": "fe5e0d40-e438-4c2d-88c3-d8c097bf450c", + "uuid": "fed91987-69d2-4883-9b35-2bbc49aa3cfa", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -21172,7 +21056,7 @@ ] }, { - "uuid": "607ef327-bfc8-4c18-b781-8f40544535f8", + "uuid": "ba0e987e-cb0d-412b-a353-83aa1d5868fc", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -21589,7 +21473,7 @@ ] }, { - "uuid": "131330bb-f40d-4c95-b39d-6e0f1a4c719e", + "uuid": "c3169d99-52cb-4b53-98a8-0ba1c7463552", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -21697,16 +21581,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "2e7c1b79-a582-4776-93a4-bb455fcc7321", + "uuid": "16993c09-31e9-46ea-8fe7-8b59f928b85f", "control-id": "hipaa_164-308.a.3.i", "description": "No notes for control-id 164.308(a)(3)(i).", "props": [ @@ -21728,7 +21607,7 @@ ] }, { - "uuid": "7a65273d-fbb1-4a66-b20c-dec94740e403", + "uuid": "ec125cc1-ae6d-4107-a041-df6c202264a9", "control-id": "hipaa_164-308.a.5.ii.a", "description": "No notes for control-id 164.308(a)(5)(ii)(A).", "props": [ @@ -21745,7 +21624,7 @@ ] }, { - "uuid": "715009a5-0f94-42f7-9fe6-2f3d3395af5e", + "uuid": "9b35a4f8-ce5b-41f1-b526-bbd02569fa31", "control-id": "hipaa_164-310.a.2.i", "description": "No notes for control-id 164.310(a)(2)(i).", "props": [ @@ -21822,7 +21701,7 @@ ] }, { - "uuid": "e08208b4-1b63-4de3-a3d6-6c4100d63456", + "uuid": "818f7598-a0ac-47db-9eb8-d766ca12857b", "control-id": "hipaa_164-310.a.2.ii", "description": "No notes for control-id 164.310(a)(2)(ii).", "props": [ @@ -21899,7 +21778,7 @@ ] }, { - "uuid": "634b3409-6532-439b-a479-2cac7c8d3219", + "uuid": "47ab8f29-b9bd-46e5-8049-b8ddd317e3a7", "control-id": "hipaa_164-310.a.2.iii", "description": "No notes for control-id 164.310(a)(2)(iii).", "props": [ @@ -21976,7 +21855,7 @@ ] }, { - "uuid": "5957bfbc-2e21-49fd-ba77-3abdf1745d09", + "uuid": "f6595863-7750-4cfa-89ff-d86c3510408b", "control-id": "hipaa_164-310.b", "description": "No notes for control-id 164.310(b).", "props": [ @@ -22208,7 +22087,7 @@ ] }, { - "uuid": "82ed8e8a-5adf-4c5c-a4f0-59863d9053d8", + "uuid": "f6e6b796-c72d-4321-b71b-41879dcf1743", "control-id": "hipaa_164-310.d.2.iii", "description": "No notes for control-id 164.310(d)(2)(iii).", "props": [ @@ -22310,7 +22189,7 @@ ] }, { - "uuid": "e8b358c0-a1a8-42cb-9a32-a66684808acf", + "uuid": "1498f4c1-1cf9-4a32-b32c-ecad1fda2838", "control-id": "hipaa_164-312.a.2.iii", "description": "No notes for control-id 164.312(a)(2)(iii).", "props": [ @@ -22327,7 +22206,7 @@ ] }, { - "uuid": "86ec33c5-1980-491a-b5b1-43e62dfece9f", + "uuid": "b256dabf-3b01-4cb9-ab71-1b00b8373d60", "control-id": "hipaa_164-312.a.2.iv", "description": "No notes for control-id 164.312(a)(2)(iv).", "props": [ @@ -22354,7 +22233,7 @@ ] }, { - "uuid": "87759b00-b5e8-4197-a7ab-d7bfdc4dfdf4", + "uuid": "e43ed761-8971-47eb-9d2a-ef462cf917f0", "control-id": "hipaa_164-312.c.2", "description": "No notes for control-id 164.312(c)(2).", "props": [ @@ -22396,7 +22275,7 @@ ] }, { - "uuid": "6773cdfc-198a-4a6d-8955-7662a6f22080", + "uuid": "652e4a07-2a3d-4ffe-88e7-2fbfa926142d", "control-id": "hipaa_164-312.e.2.i", "description": "No notes for control-id 164.312(e)(2)(i).", "props": [ @@ -22438,7 +22317,7 @@ ] }, { - "uuid": "cd341ac7-7dc6-411b-b39e-ce6c00b10d75", + "uuid": "38a891c5-4e2c-4952-a368-288f75c823f2", "control-id": "hipaa_164-312.e.2.ii", "description": "No notes for control-id 164.312(e)(2)(ii).", "props": [ @@ -22546,16 +22425,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "f73f78ba-f98c-4085-839d-b271716053ca", + "uuid": "9cb50c3d-f12b-496d-99d7-5cf37846cbe8", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -22627,7 +22501,7 @@ ] }, { - "uuid": "b429c738-b5bb-4cef-9d6d-cc40155feeaf", + "uuid": "f9d681f0-cfce-486d-aca4-48db01e33406", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -22699,7 +22573,7 @@ ] }, { - "uuid": "3f206cdb-b6df-44f2-a38a-57e7e91e7d3d", + "uuid": "e541e343-f776-45ca-b0c6-a781d800f9b5", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -22807,16 +22681,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "91555510-6f15-41bf-93bc-1fec459c49eb", + "uuid": "27d4b8dd-576a-454f-9bf2-c215947df2fc", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -22838,7 +22707,7 @@ ] }, { - "uuid": "2f40a685-1505-4430-9fff-b25478257ca7", + "uuid": "f0ed7d37-c2af-4252-857d-10957a92e480", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -23215,7 +23084,7 @@ ] }, { - "uuid": "b1512ab5-70ac-4222-9cf9-49d6f5dc29c0", + "uuid": "2da4c807-6f4c-43b4-8b21-b71f3caa1c19", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -23292,7 +23161,7 @@ ] }, { - "uuid": "83fdb029-502c-4c5d-ae13-be4939442270", + "uuid": "40fec299-3d34-4c5b-98ba-2ce6a558c76d", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -23314,7 +23183,7 @@ ] }, { - "uuid": "eea52405-cc70-4916-b069-5053ce310f1f", + "uuid": "71923cb9-c0c9-40da-aa3c-33fbb21a54c9", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -23427,16 +23296,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "eb98fa79-5b6f-4d7d-a351-a1ffe58611de", + "uuid": "2121c3b8-a63c-4b7d-8148-ad756ca35852", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -23448,7 +23312,7 @@ ] }, { - "uuid": "d941341e-cbf3-4199-850b-7be64c92ede9", + "uuid": "b40e2fca-1003-4cec-951c-6a60ac02ea87", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -23525,7 +23389,7 @@ ] }, { - "uuid": "4003b32a-fe98-414c-8fed-125393df2e84", + "uuid": "50ad8f7c-8c91-4279-8afe-58b35cca468d", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -23552,7 +23416,7 @@ ] }, { - "uuid": "f3d60387-d0d2-46df-b637-16279f84aafa", + "uuid": "b7084aa0-ed7f-42e5-9fe5-2bb76f893f2a", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -23689,7 +23553,7 @@ ] }, { - "uuid": "57facd4c-ced7-44e5-92ac-8a952751146c", + "uuid": "1bc843e9-3c6a-4fe8-b702-6e85449e9b52", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -23706,7 +23570,7 @@ ] }, { - "uuid": "fd7de7e2-e753-47b1-b782-73bbedbd060b", + "uuid": "fb06d0bc-0ecd-49aa-a6b2-0184b73187c5", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -23793,7 +23657,7 @@ ] }, { - "uuid": "5c17f7c8-61c7-49af-8c69-6ef2c1ea3f64", + "uuid": "7646a57a-840e-49db-b471-d9c3fc780e6f", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -23815,7 +23679,7 @@ ] }, { - "uuid": "88423a8a-e9e6-42f1-a361-6bcb9fa432d7", + "uuid": "03898361-9570-47ab-9d4e-dc65b7db32f2", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -23892,7 +23756,7 @@ ] }, { - "uuid": "66ff183b-5423-464a-aa5c-3daeb6072c46", + "uuid": "0b502230-a3b8-48a8-88fa-ac65e2c8f094", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -23919,7 +23783,7 @@ ] }, { - "uuid": "69f20821-0d66-4525-99d5-cc593a6c314d", + "uuid": "05069b94-61a2-4fea-badc-0364cb384a07", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -24341,7 +24205,7 @@ ] }, { - "uuid": "49e89664-a60b-4bc3-9489-beb9a210c1e4", + "uuid": "c1f7e731-8a56-4c94-8535-8b2c512ba8f7", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -24358,7 +24222,7 @@ ] }, { - "uuid": "1208f10b-89a0-43dd-bf81-86aadbec470a", + "uuid": "f688e8ca-ccb4-4e1c-9b4f-4a3642d0c4b1", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -24400,7 +24264,7 @@ ] }, { - "uuid": "5bc70fc5-858f-4b6e-af54-e6d4455d873c", + "uuid": "6105e6ac-d647-4ff1-b7a5-7c853524b7fb", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -24762,7 +24626,7 @@ ] }, { - "uuid": "91f63fb5-10ca-44af-8019-96aa7bed5f3b", + "uuid": "4373f29b-dbbe-47e8-86dd-85ef821f3308", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -25179,7 +25043,7 @@ ] }, { - "uuid": "460009b5-5632-496c-9bc9-ca002db5de5a", + "uuid": "8482d83d-c162-482c-ad2b-5145f00af29a", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -25287,16 +25151,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "9b5999bd-d763-4ca5-83ed-af5ea38afcaf", + "uuid": "9438a5cb-588b-4f3a-9178-1abbbfebeae7", "control-id": "hipaa_164-308.a.3", "description": "No notes for control-id 164.308(a)(3).", "props": [ @@ -25368,7 +25227,7 @@ ] }, { - "uuid": "22a25221-aa65-4a1f-92dc-dcfd4ccee890", + "uuid": "21a24b68-f649-4a9a-b31f-63dbf3c678f6", "control-id": "hipaa_164-308.a.4", "description": "No notes for control-id 164.308(a)(4).", "props": [ @@ -25440,7 +25299,7 @@ ] }, { - "uuid": "49299362-f145-49c2-b540-27f9de8da131", + "uuid": "307dce2e-f049-42ea-bc59-1d49b1caa62d", "control-id": "hipaa_164-308.a.4.i", "description": "No notes for control-id 164.308(a)(4)(i).", "props": [ @@ -25548,16 +25407,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "0f96f642-8221-41f0-b84a-3e25365c9a7f", + "uuid": "33f44e26-6459-46d0-af26-238760c08368", "control-id": "hipaa_164-308.a.5.ii.b", "description": "No notes for control-id 164.308(a)(5)(ii)(B).", "props": [ @@ -25579,7 +25433,7 @@ ] }, { - "uuid": "d5e47d8b-0f4e-42f4-8950-263c4a08d690", + "uuid": "0eeda19c-40ec-47b9-9755-d18f0f760bf6", "control-id": "hipaa_164-308.a.5.ii.c", "description": "No notes for control-id 164.308(a)(5)(ii)(C).", "props": [ @@ -25956,7 +25810,7 @@ ] }, { - "uuid": "db224a3b-f9ab-4463-828e-63eaeaf7eeae", + "uuid": "af022c5b-500f-45ea-a927-18c1e8e71621", "control-id": "hipaa_164-308.a.7.i", "description": "No notes for control-id 164.308(a)(7)(i).", "props": [ @@ -26033,7 +25887,7 @@ ] }, { - "uuid": "ae0448e0-603a-4167-90e0-11752eb94c36", + "uuid": "6093b218-68a6-44db-b216-b643e4f60d20", "control-id": "hipaa_164-308.a.8", "description": "No notes for control-id 164.308(a)(8).", "props": [ @@ -26055,7 +25909,7 @@ ] }, { - "uuid": "229d3c68-7047-4366-b847-5f7c4a118d6c", + "uuid": "07e447a9-71e9-4113-a629-aeee3f68f2f3", "control-id": "hipaa_164-308.b.1", "description": "No notes for control-id 164.308(b)(1).", "props": [ @@ -26168,16 +26022,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "d4cc7348-ea03-412c-b1d0-071efe823d41", + "uuid": "db2cf59b-07c1-4b21-bc6e-5f505e0226bf", "control-id": "hipaa_164-308.b.2", "description": "This title was created by analysis, not by the CFR.", "props": [ @@ -26189,7 +26038,7 @@ ] }, { - "uuid": "fa0d07e0-6e6d-4700-a095-e763be44564d", + "uuid": "d17f11be-9aec-4379-8ce3-84e7b08bd1a1", "control-id": "hipaa_164-310.a.1", "description": "No notes for control-id 164.310(a)(1).", "props": [ @@ -26266,7 +26115,7 @@ ] }, { - "uuid": "39c60899-a02a-4e37-a54c-9a1433249e68", + "uuid": "205388d0-8b4f-4809-aa10-39c905f03a34", "control-id": "hipaa_164-310.a.2.iv", "description": "No notes for control-id 164.310(a)(2)(iv).", "props": [ @@ -26293,7 +26142,7 @@ ] }, { - "uuid": "7cfd09f5-ebfe-4e1d-8d4e-e416bda5fb5f", + "uuid": "346b1043-820a-4920-8bba-3474da8e4bb4", "control-id": "hipaa_164-310.c", "description": "No notes for control-id 164.310(c).", "props": [ @@ -26430,7 +26279,7 @@ ] }, { - "uuid": "400db77f-71b6-4640-ade5-4a02df113802", + "uuid": "009c3468-fd1a-4e5d-b50e-78a21dc857e0", "control-id": "hipaa_164-310.d", "description": "No notes for control-id 164.310(d).", "props": [ @@ -26447,7 +26296,7 @@ ] }, { - "uuid": "c8514765-f2ef-4017-8c6e-eaa0fe7c52d4", + "uuid": "90f47319-fca8-421a-8124-c64cd4a4ed96", "control-id": "hipaa_164-310.d.1", "description": "No notes for control-id 164.310(d)(1).", "props": [ @@ -26534,7 +26383,7 @@ ] }, { - "uuid": "016bb3a3-51bd-4982-bad0-5b16b28192a6", + "uuid": "b2ececb5-8a1f-4ee7-89b0-a76d98a2a8c8", "control-id": "hipaa_164-310.d.2", "description": "No notes for control-id 164.310(d)(2).", "props": [ @@ -26556,7 +26405,7 @@ ] }, { - "uuid": "8f784d33-f392-45ff-8672-692674719cf8", + "uuid": "5673f123-21cf-46ba-bed9-7c69f15037c3", "control-id": "hipaa_164-312.a", "description": "No notes for control-id 164.312(a).", "props": [ @@ -26633,7 +26482,7 @@ ] }, { - "uuid": "30b42265-6d0a-40cb-9b94-986cf52c6f15", + "uuid": "7c76721f-d482-4e12-b18a-da476a713f47", "control-id": "hipaa_164-312.a.1", "description": "No notes for control-id 164.312(a)(1).", "props": [ @@ -26660,7 +26509,7 @@ ] }, { - "uuid": "b038c87f-0c32-480b-8c17-057150a8f672", + "uuid": "eac5ce3c-b70f-4d1c-804e-b1d77925442f", "control-id": "hipaa_164-312.b", "description": "No notes for control-id 164.312(b).", "props": [ @@ -27082,7 +26931,7 @@ ] }, { - "uuid": "d247906a-e046-4cc4-a967-a0ec254428b5", + "uuid": "2bb1f582-de00-497b-8a82-6128e22bf4a1", "control-id": "hipaa_164-312.c", "description": "No notes for control-id 164.312(c).", "props": [ @@ -27099,7 +26948,7 @@ ] }, { - "uuid": "36d0b14a-a1f4-4b17-9fff-9d6023a7ab28", + "uuid": "7fe18c36-120d-4b0e-8dcb-9d2b0e5a59ce", "control-id": "hipaa_164-312.c.1", "description": "No notes for control-id 164.312(c)(1).", "props": [ @@ -27141,7 +26990,7 @@ ] }, { - "uuid": "5b070f82-9a4d-47e4-90f1-a0c9e3a2869a", + "uuid": "0cbd5046-1c0d-4142-8f5d-7ff2407ff6ce", "control-id": "hipaa_164-312.d", "description": "No notes for control-id 164.312(d).", "props": [ @@ -27503,7 +27352,7 @@ ] }, { - "uuid": "4f1b51e7-26fb-4b9b-888b-171728707d96", + "uuid": "a8082791-7f8f-470e-8956-0d9753d23ea6", "control-id": "hipaa_164-312.e", "description": "No notes for control-id 164.312(e).", "props": [ @@ -27920,7 +27769,7 @@ ] }, { - "uuid": "8a68e974-5edc-4ad6-88a1-e6ac7e306ae3", + "uuid": "04f17e60-b891-489a-a2fd-3cca228fd9a5", "control-id": "hipaa_164-312.e.1", "description": "No notes for control-id 164.312(e)(1).", "props": [ @@ -28028,11 +27877,6 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] } diff --git a/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json b/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json index 3f60319aa..bd8524192 100644 --- a/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json +++ b/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "82eef6a2-1ce5-4817-af27-287cf97df8aa", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2026-01-05T17:29:29.198952+00:00", - "version": "1.8", + "last-modified": "2026-03-27T01:32:09.038711+00:00", + "version": "1.9", "oscal-version": "1.1.3" }, "components": [ @@ -311,7 +311,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -2063,1543 +2063,1531 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "coredump_disable_backtraces", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Disable core dump backtraces", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "coredump_disable_storage", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Disable storing core dump", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "disable_users_coredumps", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_kernel_core_pattern", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Disable storing core dumps", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_core_pattern", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dumps", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "package_cryptsetup-luks_installed", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Install cryptsetup Package", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cryptsetup-luks_installed", + "value": "ensure_redhat_gpgkey_installed", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install cryptsetup Package", + "value": "Ensure Red Hat GPG Key Installed", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_redhat_gpgkey_installed", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Red Hat GPG Key Installed", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "security_patches_up_to_date", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Ensure Software Patches Installed", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "security_patches_up_to_date", + "value": "account_unique_id", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Software Patches Installed", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "account_unique_name", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "group_unique_id", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "gid_passwd_group_same", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "enable_dconf_user_profile", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Configure GNOME3 DConf User Profile", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_dconf_user_profile", + "value": "dconf_db_up_to_date", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure GNOME3 DConf User Profile", + "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_db_up_to_date", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_screensaver_idle_activation_enabled", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Enable GNOME3 Screensaver Idle Activation", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_activation_enabled", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Idle Activation", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_lock_enabled", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Enable GNOME3 Screensaver Lock After Idle Period", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_enabled", + "value": "dconf_gnome_screensaver_mode_blank", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Lock After Idle Period", + "value": "Implement Blank Screensaver", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_mode_blank", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Blank Screensaver", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "sshd_set_keepalive", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "disable_host_auth", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "gnome_gdm_disable_automatic_login", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Disable GDM Automatic Login", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_automatic_login", + "value": "no_empty_passwords", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Automatic Login", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "enable_authselect", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Enable authselect", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_authselect", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable authselect", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_unix_remember", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Limit Password Reuse", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_remember", + "value": "accounts_password_pam_pwhistory_remember_password_auth", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse", + "value": "Limit Password Reuse: password-auth", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_password_auth", + "value": "accounts_password_pam_pwhistory_remember_system_auth", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: password-auth", + "value": "Limit Password Reuse: system-auth", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_system_auth", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: system-auth", + "value": "Set Password Maximum Age", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "accounts_password_set_max_life_existing", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Set Existing Passwords Maximum Age", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_max_life_existing", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Maximum Age", + "value": "Set Password Warning Age", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_password_set_warn_age_existing", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_warn_age_existing", + "value": "accounts_tmout", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Warning Age", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_direct_root_logins", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "securetty_root_login_console_only", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Restrict Virtual Console Root Logins", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "securetty_root_login_console_only", + "value": "audit_rules_suid_privilege_function", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Virtual Console Root Logins", + "value": "Record Events When Privileged Executables Are Run", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_privilege_function", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Privileged Executables Are Run", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_login_events_tallylog", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Logon and Logout Events - tallylog", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_tallylog", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - tallylog", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_188" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_188" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_189" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_251" + "remarks": "rule_set_250" } ], "control-implementations": [ { - "uuid": "4f7355f3-fea7-49dd-93e5-332a29f731a8", + "uuid": "8d780869-3c40-4664-a17d-d8cf8edbf146", "source": "trestle://profiles/rhel9-pcidss_4-base/profile.json", "description": "Control implementation for pci-dss", "props": [ @@ -3799,7 +3787,7 @@ ], "implemented-requirements": [ { - "uuid": "dd547fac-d963-45b1-821d-268983062d3b", + "uuid": "24e5075c-c38e-4e94-a9be-4f8899e49287", "control-id": "pcidss_4_1-1.1", "description": "The description for control-id pcidss_4_1-1.1.", "props": [ @@ -3812,7 +3800,7 @@ ] }, { - "uuid": "44e72be7-17b3-44fe-ac2a-7195cb23ebcc", + "uuid": "98041b05-2d66-4950-8108-3cce1e564ca1", "control-id": "pcidss_4_1-1.2", "description": "The description for control-id pcidss_4_1-1.2.", "props": [ @@ -3825,7 +3813,7 @@ ] }, { - "uuid": "283fd3c7-a5bc-47ea-bd23-8d7e5e54d39b", + "uuid": "a3b924ed-b513-4c00-a471-ad15deb660e8", "control-id": "pcidss_4_1-2.1", "description": "Examples of NSCs covered by these configuration standards include, but are not limited to,\nfirewalls, routers configured with access control lists, and cloud virtual networks. The\nobjective of this requirement is to ensure the way that NSCs are configured and operate\nare defined and consistently applied. While the tooling and standards can be automated,\nthe review of allowed accesses should be manual as different sites may have different\npolicies.", "props": [ @@ -3857,7 +3845,7 @@ ] }, { - "uuid": "af0dfc89-b204-4bc5-922e-841458670ab3", + "uuid": "e6d2a9a5-8eaa-4beb-b6b8-94cd02660211", "control-id": "pcidss_4_1-2.2", "description": "The description for control-id pcidss_4_1-2.2.", "props": [ @@ -3870,7 +3858,7 @@ ] }, { - "uuid": "a3d52370-6ea5-4f68-bcb4-bad45c97c30e", + "uuid": "b6680476-813b-40dd-b3be-d82780543b2b", "control-id": "pcidss_4_1-2.3", "description": "The description for control-id pcidss_4_1-2.3.", "props": [ @@ -3883,7 +3871,7 @@ ] }, { - "uuid": "829eb8e9-d11c-4512-8175-4954c73e870e", + "uuid": "be190fd8-1b4e-4e48-8018-a89003cffa18", "control-id": "pcidss_4_1-2.4", "description": "The description for control-id pcidss_4_1-2.4.", "props": [ @@ -3896,7 +3884,7 @@ ] }, { - "uuid": "de5ebe27-ff21-4ea5-b2e9-c1eed66475be", + "uuid": "fa6ea296-a89e-4462-90ae-00839803ce54", "control-id": "pcidss_4_1-2.5", "description": "The description for control-id pcidss_4_1-2.5.", "props": [ @@ -3909,7 +3897,7 @@ ] }, { - "uuid": "1ce64e95-7a14-4977-9b4f-327093c241ec", + "uuid": "8d392a84-3c91-4933-aae6-be4d152b0b48", "control-id": "pcidss_4_1-2.6", "description": "The specific risks associated with the use of insecure services, protocols, and ports are\nunderstood, assessed, and appropriately mitigated. The selected rules here basically\nremove services without encryption and restricted some common services.", "props": [ @@ -3946,7 +3934,7 @@ ] }, { - "uuid": "16f1c676-8ed0-4467-a05e-6865e901d78e", + "uuid": "df08a5a4-1887-491a-87f2-f6bd120cb841", "control-id": "pcidss_4_1-2.7", "description": "The description for control-id pcidss_4_1-2.7.", "props": [ @@ -3959,7 +3947,7 @@ ] }, { - "uuid": "d7220e20-c072-49f9-ba85-43714d83999e", + "uuid": "f458082f-b964-421d-aeec-50cca61b466c", "control-id": "pcidss_4_1-2.8", "description": "No notes for control-id 1.2.8.", "props": [ @@ -3991,7 +3979,7 @@ ] }, { - "uuid": "61cb4c59-0b5a-4cfe-9d48-29a542bec814", + "uuid": "ae451eec-39f8-48d9-93e3-e729a4225399", "control-id": "pcidss_4_1-3.1", "description": "No notes for control-id 1.3.1.", "props": [ @@ -4013,7 +4001,7 @@ ] }, { - "uuid": "9b1bc45d-6fe4-4869-aca2-3afea4baeae9", + "uuid": "75f20957-ab95-44ba-8699-1b837905257a", "control-id": "pcidss_4_1-3.2", "description": "The description for control-id pcidss_4_1-3.2.", "props": [ @@ -4026,7 +4014,7 @@ ] }, { - "uuid": "e59d9578-c0de-4b8e-a64f-00393b41156e", + "uuid": "ca65d448-fed9-4484-9b2d-f612cd18e599", "control-id": "pcidss_4_1-3.3", "description": "Wireless interfaces are not expected in servers so they are disabled by default in this\npolicy.", "props": [ @@ -4043,7 +4031,7 @@ ] }, { - "uuid": "c7378275-5665-43b5-b33b-3a96f2b9c447", + "uuid": "8235e9d2-7c4e-4c70-a628-89b4679131b3", "control-id": "pcidss_4_1-4.1", "description": "Trusted and untrusted networks are expected to be different for each environment.\nBut loopback traffic is assumed to be trusted and even necessary for some services.\nThis requirement is complements 1.2.1 and 1.3.1 requirements.", "props": [ @@ -4070,7 +4058,7 @@ ] }, { - "uuid": "247d0a7b-6da4-4d73-8c96-f7d178a453af", + "uuid": "7cd9a878-34a9-49b9-b482-0b7cced001d0", "control-id": "pcidss_4_1-4.2", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -4112,7 +4100,7 @@ ] }, { - "uuid": "a81d01d4-6290-417f-9fdf-5de9186942b6", + "uuid": "b6dedd14-c2c2-4fce-9aae-2823a3250621", "control-id": "pcidss_4_1-4.3", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -4149,7 +4137,7 @@ ] }, { - "uuid": "5a19b3b2-2cdb-4525-a2ed-010c2aff98c9", + "uuid": "71ff143c-398b-46f8-a73f-76856fee914b", "control-id": "pcidss_4_1-4.4", "description": "The description for control-id pcidss_4_1-4.4.", "props": [ @@ -4162,7 +4150,7 @@ ] }, { - "uuid": "a4753ce6-686e-45e5-8d9a-482751247de8", + "uuid": "b835931a-164c-42c9-83cf-94635d3c70e6", "control-id": "pcidss_4_1-4.5", "description": "No notes for control-id 1.4.5.", "props": [ @@ -4189,7 +4177,7 @@ ] }, { - "uuid": "00a99a58-ce68-4515-9da7-28479641e3f7", + "uuid": "fab5aa35-c966-4920-85be-be72d39eb9bf", "control-id": "pcidss_4_1-5.1", "description": "To ensure this requirement, a manual analysis of site policy and topology is inevitable.\nFrom the technical perspective, previous requirements should already cover this\nrequirement at some level.", "props": [ @@ -4201,7 +4189,7 @@ ] }, { - "uuid": "197f86f9-ed17-4a8a-9d32-c5a102dbdd39", + "uuid": "f2e1fc71-688b-4b3f-878b-aea10d78e7b8", "control-id": "pcidss_4_2-1.1", "description": "The description for control-id pcidss_4_2-1.1.", "props": [ @@ -4214,7 +4202,7 @@ ] }, { - "uuid": "65b2cfd7-16e5-4d8e-8073-0ec8d1d45a3e", + "uuid": "6b15312d-fa04-4f57-9272-0af95495ad25", "control-id": "pcidss_4_2-1.2", "description": "The description for control-id pcidss_4_2-1.2.", "props": [ @@ -4227,7 +4215,7 @@ ] }, { - "uuid": "88b5a2ba-59a1-47bc-922d-e4e6b1628577", + "uuid": "58588bfd-acc8-46df-aa1c-04550c43e351", "control-id": "pcidss_4_2-2.1", "description": "Interestingly this requirement recommends other standards, such as Center for Internet\nSecurity (CIS), International Organization for Standardization (ISO), National Institute\nof Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the\nrules included here are very generic in terms of hardening.", "props": [ @@ -4244,7 +4232,7 @@ ] }, { - "uuid": "d115d2ea-4a19-4f02-81b5-b56af991d9d5", + "uuid": "c11050aa-7e4f-4f53-b616-f88317a2d2f9", "control-id": "pcidss_4_2-2.2", "description": "Also related to requirement 8.2.6 and 8.3.5.", "props": [ @@ -4266,7 +4254,7 @@ ] }, { - "uuid": "9f50def8-3887-461b-b632-3c46ddc8dbbd", + "uuid": "938e8920-c3b4-41d1-a121-9949b1ba5a0a", "control-id": "pcidss_4_2-2.3", "description": "The description for control-id pcidss_4_2-2.3.", "props": [ @@ -4279,7 +4267,7 @@ ] }, { - "uuid": "0874eb14-f7cf-4571-a39f-aac3dd2c634e", + "uuid": "aa6bdbc5-858b-45fa-9515-3bed9a046629", "control-id": "pcidss_4_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -4341,7 +4329,7 @@ ] }, { - "uuid": "9a222313-e5fe-4b90-8be2-83e213b35cc1", + "uuid": "a624a343-5ad8-4726-8a46-8b2c193f02ad", "control-id": "pcidss_4_2-2.5", "description": "The description for control-id pcidss_4_2-2.5.", "props": [ @@ -4354,7 +4342,7 @@ ] }, { - "uuid": "d3730d27-8239-454b-ba72-de5a7145acf1", + "uuid": "15a517a4-77df-4760-bbbc-f7dd44eecc1c", "control-id": "pcidss_4_2-2.6", "description": "This requirement is not specific but also points to 2.2.1, where other policies are\nreferenced. Therefore, the most common rules related to system configuration in order to\nprevent misuse and selected in main profiles are also selected here.", "props": [ @@ -4751,7 +4739,7 @@ ] }, { - "uuid": "f14e4945-20b7-4e3b-a653-70ca5cd34d44", + "uuid": "f0db9991-cb44-4f5c-9a7b-5ee7bfbbc13c", "control-id": "pcidss_4_2-2.7", "description": "Related to requirement 12.3.3.", "props": [ @@ -4764,16 +4752,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "79ad05ae-3170-4a19-aac4-f93b6505d22e", + "uuid": "1b051af3-3af0-40e9-b142-32b14f27a569", "control-id": "pcidss_4_2-3.1", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -4785,7 +4768,7 @@ ] }, { - "uuid": "2a57fee5-d733-4c7f-a4cc-3b46eb83399b", + "uuid": "39c6826a-4751-450c-9465-3f798da2ee5f", "control-id": "pcidss_4_2-3.2", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -4797,7 +4780,7 @@ ] }, { - "uuid": "8d142869-dcb0-4cb5-93ab-fdd8dc679afc", + "uuid": "4f70de4d-1d86-4116-b57d-31c5f655fc35", "control-id": "pcidss_4_3-1.1", "description": "The description for control-id pcidss_4_3-1.1.", "props": [ @@ -4810,7 +4793,7 @@ ] }, { - "uuid": "2139f454-4b9a-47da-8c97-3e233946c3cf", + "uuid": "5fe5ce5b-a222-4c1f-b523-1675864789a1", "control-id": "pcidss_4_3-1.2", "description": "The description for control-id pcidss_4_3-1.2.", "props": [ @@ -4823,7 +4806,7 @@ ] }, { - "uuid": "f51b93fc-cf9e-42c9-a7cf-032033d3e05c", + "uuid": "e72364a6-2429-48b2-8beb-bfe98bc9cc99", "control-id": "pcidss_4_3-2.1", "description": "The description for control-id pcidss_4_3-2.1.", "props": [ @@ -4836,7 +4819,7 @@ ] }, { - "uuid": "fc706f2d-d630-4ca6-9747-53b70d34519c", + "uuid": "33f18260-358f-48ad-9bc2-66cdd75f31c9", "control-id": "pcidss_4_3-3.1.1", "description": "This requirement consists in auditing files, databases and memory to make sure the full\ncontent of any track is not unnecessarily stored. It involves manual auditing but some\nautomated rules fit this requirement in order to reduce the chances if this data be\nunintentionally stored in memory.", "props": [ @@ -4878,7 +4861,7 @@ ] }, { - "uuid": "dacd88bc-1bdc-4fa9-82e7-f2974eb69c53", + "uuid": "9a457f16-cef7-4a77-8f28-554741391ab5", "control-id": "pcidss_4_3-3.1.2", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -4890,7 +4873,7 @@ ] }, { - "uuid": "92b65275-7ad3-4b52-983a-4fbce72ad7eb", + "uuid": "a6622940-25f3-412a-9bbb-9415a8ca46ee", "control-id": "pcidss_4_3-3.1.3", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -4902,7 +4885,7 @@ ] }, { - "uuid": "9458793a-b797-4bef-98eb-824a311498bf", + "uuid": "9741b3f9-d577-4f9f-93bd-b10d25356531", "control-id": "pcidss_4_3-3.2", "description": "The description for control-id pcidss_4_3-3.2.", "props": [ @@ -4915,7 +4898,7 @@ ] }, { - "uuid": "2991464e-0049-4d94-a7a2-f21f2d36aa3a", + "uuid": "75c30e1e-06d3-47ae-b37b-51e918bd0cbd", "control-id": "pcidss_4_3-3.3", "description": "The description for control-id pcidss_4_3-3.3.", "props": [ @@ -4928,7 +4911,7 @@ ] }, { - "uuid": "9ddf04b9-0c8b-4a87-b8e8-d906954e3421", + "uuid": "f595e950-9f11-42ce-90b7-23eedaa08130", "control-id": "pcidss_4_3-4.1", "description": "The description for control-id pcidss_4_3-4.1.", "props": [ @@ -4941,7 +4924,7 @@ ] }, { - "uuid": "aeb969b2-0d30-4fdd-b538-cabe0d9ff0a2", + "uuid": "5b179126-0cd0-466f-9e83-2015f31bf34f", "control-id": "pcidss_4_3-4.2", "description": "There are technical rules to disable removable storage devices. However, this requirement\nstill demand some manual auditing in documentation and eventual exceptions.", "props": [ @@ -4968,7 +4951,7 @@ ] }, { - "uuid": "40bf3eda-6976-4d10-aaed-4a4522156056", + "uuid": "123049d5-680c-4d40-89bf-e04ce5630331", "control-id": "pcidss_4_3-5.1.1", "description": "The description for control-id pcidss_4_3-5.1.1.", "props": [ @@ -4981,7 +4964,7 @@ ] }, { - "uuid": "422650ce-b4bc-4a4b-82ec-fa678081208d", + "uuid": "11b436e1-294c-4084-a3e6-bd1700845873", "control-id": "pcidss_4_3-5.1.2", "description": "No notes for control-id 3.5.1.2.", "props": [ @@ -4998,7 +4981,7 @@ ] }, { - "uuid": "e26255ab-1dd4-4943-8a26-3767fb7f23f2", + "uuid": "a9c2822e-5305-47a7-b577-b9ac064f2351", "control-id": "pcidss_4_3-5.1.3", "description": "The description for control-id pcidss_4_3-5.1.3.", "props": [ @@ -5011,7 +4994,7 @@ ] }, { - "uuid": "402af078-70f3-41f4-a535-389920d8fc93", + "uuid": "47561ca0-f846-4762-8c96-4773d7d7e847", "control-id": "pcidss_4_3-6.1.1", "description": "The description for control-id pcidss_4_3-6.1.1.", "props": [ @@ -5024,7 +5007,7 @@ ] }, { - "uuid": "ebe1f448-580e-4d14-89c3-c4013ca740e7", + "uuid": "fc49351b-3367-4a50-978b-5ebec6f78671", "control-id": "pcidss_4_3-6.1.2", "description": "The description for control-id pcidss_4_3-6.1.2.", "props": [ @@ -5037,7 +5020,7 @@ ] }, { - "uuid": "8bdd1d9f-c772-4a3d-bef7-1dce5172eda2", + "uuid": "ec9359d6-6a16-4d7b-93bb-f2ad836ba5ad", "control-id": "pcidss_4_3-6.1.3", "description": "The description for control-id pcidss_4_3-6.1.3.", "props": [ @@ -5050,7 +5033,7 @@ ] }, { - "uuid": "ff2bb23c-4852-4a41-8065-315975654ae5", + "uuid": "dcf45709-54b8-4c2a-ab7f-c5b02281044f", "control-id": "pcidss_4_3-6.1.4", "description": "The description for control-id pcidss_4_3-6.1.4.", "props": [ @@ -5063,7 +5046,7 @@ ] }, { - "uuid": "00e750aa-68d4-4722-8871-c0dd29829535", + "uuid": "8c6e24af-19f0-4135-9dc3-cdb416ac9159", "control-id": "pcidss_4_3-7.1", "description": "The description for control-id pcidss_4_3-7.1.", "props": [ @@ -5076,7 +5059,7 @@ ] }, { - "uuid": "87063a6b-6bdd-4e8d-9431-d394b086ae74", + "uuid": "684bb0a0-a896-4f1a-b154-5727bbe958b0", "control-id": "pcidss_4_3-7.2", "description": "The description for control-id pcidss_4_3-7.2.", "props": [ @@ -5089,7 +5072,7 @@ ] }, { - "uuid": "65a5a8fd-b86b-4ed0-a722-ec178b0e2912", + "uuid": "4069fa7d-db2a-4979-9afa-320a4bcb6e4c", "control-id": "pcidss_4_3-7.3", "description": "The description for control-id pcidss_4_3-7.3.", "props": [ @@ -5102,7 +5085,7 @@ ] }, { - "uuid": "e046304e-f332-4728-8292-2c18ca32cfe8", + "uuid": "b3be16a9-916f-4b88-bb76-8e18977d6b92", "control-id": "pcidss_4_3-7.4", "description": "The description for control-id pcidss_4_3-7.4.", "props": [ @@ -5115,7 +5098,7 @@ ] }, { - "uuid": "92e7c384-0ef9-44b9-a315-5b56fdfa0717", + "uuid": "74016071-9766-4642-b2de-4b40032a9102", "control-id": "pcidss_4_3-7.5", "description": "The description for control-id pcidss_4_3-7.5.", "props": [ @@ -5128,7 +5111,7 @@ ] }, { - "uuid": "40929209-c255-4e00-8787-51d148868c13", + "uuid": "4daa22c9-e588-4055-b35a-bc75b59449af", "control-id": "pcidss_4_3-7.6", "description": "The description for control-id pcidss_4_3-7.6.", "props": [ @@ -5141,7 +5124,7 @@ ] }, { - "uuid": "fe79f1e6-0558-4aae-9c84-8f64c820b3f0", + "uuid": "f2207e1e-70fc-4f49-b9f3-0b0f1b8fdfa9", "control-id": "pcidss_4_3-7.7", "description": "The description for control-id pcidss_4_3-7.7.", "props": [ @@ -5154,7 +5137,7 @@ ] }, { - "uuid": "6fc4fd6f-89e6-45ce-ba74-c106fcff77e2", + "uuid": "3a5c4887-72a3-490b-9e81-f9761309cd34", "control-id": "pcidss_4_3-7.8", "description": "The description for control-id pcidss_4_3-7.8.", "props": [ @@ -5167,7 +5150,7 @@ ] }, { - "uuid": "2e47d679-a15f-456c-834c-665db48e2508", + "uuid": "974d4f5f-6400-4433-a29d-d2c4b7d58ef2", "control-id": "pcidss_4_3-7.9", "description": "The description for control-id pcidss_4_3-7.9.", "props": [ @@ -5180,7 +5163,7 @@ ] }, { - "uuid": "b261c015-ab63-45c6-937a-afa8e07baafb", + "uuid": "a4fc14fe-aca0-4b89-a06a-c5118b76185d", "control-id": "pcidss_4_4-1.1", "description": "The description for control-id pcidss_4_4-1.1.", "props": [ @@ -5193,7 +5176,7 @@ ] }, { - "uuid": "618f797e-ff9f-4e69-bc00-440a2400107f", + "uuid": "51eb27f1-a961-41a4-a0da-960d15e33fa7", "control-id": "pcidss_4_4-1.2", "description": "The description for control-id pcidss_4_4-1.2.", "props": [ @@ -5206,7 +5189,7 @@ ] }, { - "uuid": "d152da88-4a84-4bd1-ae91-0140808cf447", + "uuid": "5b1a7bf0-da88-4f80-a85b-10720b5a6f31", "control-id": "pcidss_4_4-2.1.1", "description": "The description for control-id pcidss_4_4-2.1.1.", "props": [ @@ -5219,7 +5202,7 @@ ] }, { - "uuid": "5ae07ceb-a0ba-44d8-bfb2-eced8cc44002", + "uuid": "955c306d-52ea-4971-a7ba-823fafad3278", "control-id": "pcidss_4_4-2.1.2", "description": "The description for control-id pcidss_4_4-2.1.2.", "props": [ @@ -5232,7 +5215,7 @@ ] }, { - "uuid": "4035399e-d7fc-4f76-88f2-112e2a8ee0ab", + "uuid": "7ba2a6b4-8305-4eeb-807e-ea53fda132ee", "control-id": "pcidss_4_4-2.2", "description": "The description for control-id pcidss_4_4-2.2.", "props": [ @@ -5245,7 +5228,7 @@ ] }, { - "uuid": "9016edf2-4200-416f-8559-bbf197fd2e53", + "uuid": "c3eaba94-d7ce-48bd-8d6a-15a58c11c276", "control-id": "pcidss_4_5-1.1", "description": "The description for control-id pcidss_4_5-1.1.", "props": [ @@ -5258,7 +5241,7 @@ ] }, { - "uuid": "ae44590c-2fa6-4a47-9ff6-3168a17c4dbb", + "uuid": "7d8f7376-8e8c-4fdf-831d-2d70403c8ab7", "control-id": "pcidss_4_5-1.2", "description": "The description for control-id pcidss_4_5-1.2.", "props": [ @@ -5271,7 +5254,7 @@ ] }, { - "uuid": "6621a2ac-1e83-4d7a-a6ee-b45a38c534bd", + "uuid": "e83db8b4-957c-43b2-b771-9e20695ab320", "control-id": "pcidss_4_5-2.1", "description": "There are many options of anti-malware and the criteria for any adopted solution or\napproach relies on each site policy. Technologies are supported but manual assessment is\nrequired.", "props": [ @@ -5283,7 +5266,7 @@ ] }, { - "uuid": "12950f16-51ae-4149-b1f9-76e91d7d16d3", + "uuid": "553cde0f-1690-49df-9381-5b377731c4b3", "control-id": "pcidss_4_5-2.2", "description": "The description for control-id pcidss_4_5-2.2.", "props": [ @@ -5296,7 +5279,7 @@ ] }, { - "uuid": "cd8bedf9-fc08-441a-b929-43870b84a41c", + "uuid": "3f2e6388-358e-438d-bb60-4d238a01a64a", "control-id": "pcidss_4_5-2.3.1", "description": "The description for control-id pcidss_4_5-2.3.1.", "props": [ @@ -5309,7 +5292,7 @@ ] }, { - "uuid": "6c3b4917-c77d-4396-84ec-4c838de1b8c0", + "uuid": "fc538a8e-97d6-411c-8fbe-d328656564c3", "control-id": "pcidss_4_5-3.1", "description": "The description for control-id pcidss_4_5-3.1.", "props": [ @@ -5322,7 +5305,7 @@ ] }, { - "uuid": "a03b6a54-d510-4edd-8f0c-0696befaa843", + "uuid": "206600a3-2074-4152-a417-b6e3b32d9023", "control-id": "pcidss_4_5-3.2.1", "description": "The description for control-id pcidss_4_5-3.2.1.", "props": [ @@ -5335,7 +5318,7 @@ ] }, { - "uuid": "bf96098f-b93e-40da-8e0d-85b5cb86255c", + "uuid": "78d65363-cb4a-4327-9160-0f47e1f9d194", "control-id": "pcidss_4_5-3.3", "description": "The description for control-id pcidss_4_5-3.3.", "props": [ @@ -5348,7 +5331,7 @@ ] }, { - "uuid": "3ea89e58-f367-4390-be6b-f329e20bc2f6", + "uuid": "f19d7248-8c7c-48b7-8e73-69c7c0e8c713", "control-id": "pcidss_4_5-3.4", "description": "The description for control-id pcidss_4_5-3.4.", "props": [ @@ -5361,7 +5344,7 @@ ] }, { - "uuid": "d4fb8195-1087-459e-8daf-d10be9719533", + "uuid": "4181cc0f-79fe-43cc-ba45-3ae7560bea0a", "control-id": "pcidss_4_5-3.5", "description": "The description for control-id pcidss_4_5-3.5.", "props": [ @@ -5374,7 +5357,7 @@ ] }, { - "uuid": "024ab621-b73b-417c-8596-c24e87310c48", + "uuid": "d657be9d-dfe8-4d17-9ca8-69ae98dedb42", "control-id": "pcidss_4_5-4.1", "description": "The description for control-id pcidss_4_5-4.1.", "props": [ @@ -5387,7 +5370,7 @@ ] }, { - "uuid": "3c86d0e1-d907-4a02-85c1-3b2e286b1804", + "uuid": "d6b778c1-2bc8-47aa-8e9f-a42bced57728", "control-id": "pcidss_4_6-1.1", "description": "The description for control-id pcidss_4_6-1.1.", "props": [ @@ -5400,7 +5383,7 @@ ] }, { - "uuid": "92383b58-07d4-4100-b939-504a9428e782", + "uuid": "2b8d60b0-0649-4ae0-a630-64361b26cfcc", "control-id": "pcidss_4_6-1.2", "description": "The description for control-id pcidss_4_6-1.2.", "props": [ @@ -5413,7 +5396,7 @@ ] }, { - "uuid": "27513c17-b525-4b4c-b6d8-76d85716f6e8", + "uuid": "f74813d8-f708-4bba-a22d-53e5f3875fd6", "control-id": "pcidss_4_6-2.1", "description": "The description for control-id pcidss_4_6-2.1.", "props": [ @@ -5426,7 +5409,7 @@ ] }, { - "uuid": "2ca02358-e8ad-4264-a60f-37318d75473e", + "uuid": "3d9721e0-70ee-4dfa-bdea-59208ec26af7", "control-id": "pcidss_4_6-2.2", "description": "The description for control-id pcidss_4_6-2.2.", "props": [ @@ -5439,7 +5422,7 @@ ] }, { - "uuid": "1b640d66-1163-4143-8750-9f7bf817d0d8", + "uuid": "6a7c3afa-12c4-4882-8d70-aa692f187e52", "control-id": "pcidss_4_6-2.3.1", "description": "The description for control-id pcidss_4_6-2.3.1.", "props": [ @@ -5452,7 +5435,7 @@ ] }, { - "uuid": "305c6c80-a891-4304-a17f-463667599db8", + "uuid": "fdf0583e-6875-4607-b709-d152440f598b", "control-id": "pcidss_4_6-2.4", "description": "The description for control-id pcidss_4_6-2.4.", "props": [ @@ -5465,7 +5448,7 @@ ] }, { - "uuid": "c368a49e-83ef-4b9b-84e3-fb7b67a76ade", + "uuid": "c722001b-7cf1-43dd-99c0-858eb32f2709", "control-id": "pcidss_4_6-3.1", "description": "The description for control-id pcidss_4_6-3.1.", "props": [ @@ -5478,7 +5461,7 @@ ] }, { - "uuid": "2909be8e-093c-4b8d-b4f0-8fedaacdc102", + "uuid": "218f4158-cd2b-4486-988e-3f18bc519bd6", "control-id": "pcidss_4_6-3.2", "description": "The description for control-id pcidss_4_6-3.2.", "props": [ @@ -5491,7 +5474,7 @@ ] }, { - "uuid": "fbcf768a-b25a-47cd-8e2f-13dd142c97eb", + "uuid": "d7fafab2-8e2c-4163-8ee0-4a624eff1ea2", "control-id": "pcidss_4_6-3.3", "description": "No notes for control-id 6.3.3.", "props": [ @@ -5523,7 +5506,7 @@ ] }, { - "uuid": "1b166c62-36c2-4bfb-bcb4-87fe05e3f36d", + "uuid": "e2b04c52-3ed5-4b42-a8bc-74065b9c30cb", "control-id": "pcidss_4_6-4.1", "description": "The description for control-id pcidss_4_6-4.1.", "props": [ @@ -5536,7 +5519,7 @@ ] }, { - "uuid": "fda91d40-3a78-4ee1-9a6c-f86f9db4f803", + "uuid": "4ccbcb76-61c3-4b54-9439-9afcaf5c0a46", "control-id": "pcidss_4_6-4.2", "description": "The description for control-id pcidss_4_6-4.2.", "props": [ @@ -5549,7 +5532,7 @@ ] }, { - "uuid": "35213133-41fd-4fa1-9cff-15633c373fa8", + "uuid": "d10c822d-138b-49a6-b572-ca43464e548e", "control-id": "pcidss_4_6-4.3", "description": "The description for control-id pcidss_4_6-4.3.", "props": [ @@ -5562,7 +5545,7 @@ ] }, { - "uuid": "eeb17d0b-5cca-4cca-9266-96c0a483e412", + "uuid": "e94a93d3-ace3-43db-9537-9471d3cebdb7", "control-id": "pcidss_4_6-5.1", "description": "The description for control-id pcidss_4_6-5.1.", "props": [ @@ -5575,7 +5558,7 @@ ] }, { - "uuid": "fd48c59b-906f-4184-bcd7-efaa37757fe9", + "uuid": "89276e40-fc11-443a-8e11-3be42ed26d28", "control-id": "pcidss_4_6-5.2", "description": "The description for control-id pcidss_4_6-5.2.", "props": [ @@ -5588,7 +5571,7 @@ ] }, { - "uuid": "3d9c0710-5f38-48cf-86b5-1ad7aacbb08a", + "uuid": "f3236fdc-2a7d-4a90-85d9-37d1e6cca951", "control-id": "pcidss_4_6-5.3", "description": "The description for control-id pcidss_4_6-5.3.", "props": [ @@ -5601,7 +5584,7 @@ ] }, { - "uuid": "bf703711-172d-45e3-a8e1-4bd13145053c", + "uuid": "79f3993e-2db7-4226-987b-957d2da708b9", "control-id": "pcidss_4_6-5.4", "description": "The description for control-id pcidss_4_6-5.4.", "props": [ @@ -5614,7 +5597,7 @@ ] }, { - "uuid": "2a9f63a3-5434-49c7-bd3c-998447a881fc", + "uuid": "256ce7d6-28ca-4cda-971c-0db41e5a5d7c", "control-id": "pcidss_4_6-5.5", "description": "The description for control-id pcidss_4_6-5.5.", "props": [ @@ -5627,7 +5610,7 @@ ] }, { - "uuid": "d5a7a568-56fd-4846-87c4-3d15d9ed68fb", + "uuid": "6d9a760e-c05a-421a-b996-d7bd1deeee8f", "control-id": "pcidss_4_6-5.6", "description": "The description for control-id pcidss_4_6-5.6.", "props": [ @@ -5640,7 +5623,7 @@ ] }, { - "uuid": "d5ef998b-708e-4a47-9d99-0683141f7144", + "uuid": "651566a7-ba19-447a-afd2-8d58a09775ce", "control-id": "pcidss_4_7-1.1", "description": "The description for control-id pcidss_4_7-1.1.", "props": [ @@ -5653,7 +5636,7 @@ ] }, { - "uuid": "4f1e8abd-2653-49ba-a244-0e16b7e9efe2", + "uuid": "da2cdeea-6b66-46c2-a570-be890c396583", "control-id": "pcidss_4_7-1.2", "description": "The description for control-id pcidss_4_7-1.2.", "props": [ @@ -5666,7 +5649,7 @@ ] }, { - "uuid": "6952a498-d639-4d77-b677-6a67bc48b395", + "uuid": "5ab51b8b-05d6-4508-a745-b0221bc6baea", "control-id": "pcidss_4_7-2.1", "description": "The description for control-id pcidss_4_7-2.1.", "props": [ @@ -5679,7 +5662,7 @@ ] }, { - "uuid": "c698a741-5199-43eb-a191-706b7ada8291", + "uuid": "1552b12d-2fd6-41e9-93a5-3d94e194e3d3", "control-id": "pcidss_4_7-2.2", "description": "The description for control-id pcidss_4_7-2.2.", "props": [ @@ -5692,7 +5675,7 @@ ] }, { - "uuid": "a56bb354-414f-4f39-ba08-8da1d4e50831", + "uuid": "26ef6e9b-b965-4703-9544-d70a077d0643", "control-id": "pcidss_4_7-2.3", "description": "The description for control-id pcidss_4_7-2.3.", "props": [ @@ -5705,7 +5688,7 @@ ] }, { - "uuid": "ff136a1d-7d95-4eda-a58f-95ee1b504c6a", + "uuid": "5fb9151d-6e4a-43db-8c1f-a17a1bd7dd70", "control-id": "pcidss_4_7-2.4", "description": "The description for control-id pcidss_4_7-2.4.", "props": [ @@ -5718,7 +5701,7 @@ ] }, { - "uuid": "06fd6923-06cb-418a-9153-74324f368145", + "uuid": "d802223f-ed6b-4ee3-a336-966bb1ad3be0", "control-id": "pcidss_4_7-2.5.1", "description": "The description for control-id pcidss_4_7-2.5.1.", "props": [ @@ -5731,7 +5714,7 @@ ] }, { - "uuid": "cbf74e7a-594d-4712-b215-7bc0a3701b6b", + "uuid": "cc08f352-e944-4149-88e5-99db2687c376", "control-id": "pcidss_4_7-2.6", "description": "The description for control-id pcidss_4_7-2.6.", "props": [ @@ -5744,7 +5727,7 @@ ] }, { - "uuid": "47067580-b8f1-4995-af52-5e640847c29d", + "uuid": "30da2e4e-3c64-4cbe-89bf-9caa9e02c957", "control-id": "pcidss_4_7-3.1", "description": "The description for control-id pcidss_4_7-3.1.", "props": [ @@ -5757,7 +5740,7 @@ ] }, { - "uuid": "bfe9aa2f-b729-46ae-9faa-4e0f15c5c1d5", + "uuid": "e12f5a52-f149-466d-913f-b3d1da20851e", "control-id": "pcidss_4_7-3.2", "description": "The description for control-id pcidss_4_7-3.2.", "props": [ @@ -5770,7 +5753,7 @@ ] }, { - "uuid": "a190e7b4-169d-4a13-a70d-b8c5e8a8b01f", + "uuid": "260475e1-13e2-42c1-9620-3c8192fc292c", "control-id": "pcidss_4_7-3.3", "description": "The description for control-id pcidss_4_7-3.3.", "props": [ @@ -5783,7 +5766,7 @@ ] }, { - "uuid": "7a9ec98c-8eaa-4e1c-90fd-dbe1dcb30e2a", + "uuid": "7b47d0e2-6510-42c2-a99e-6c3c58c1cfd6", "control-id": "pcidss_4_8-1.1", "description": "The description for control-id pcidss_4_8-1.1.", "props": [ @@ -5796,7 +5779,7 @@ ] }, { - "uuid": "a823643b-291c-4e92-b328-5853be90b84c", + "uuid": "88b64589-7e3f-4a41-a988-8e50a1c06de8", "control-id": "pcidss_4_8-1.2", "description": "The description for control-id pcidss_4_8-1.2.", "props": [ @@ -5809,7 +5792,7 @@ ] }, { - "uuid": "5ddfbd7f-0df6-4cc4-9f35-41af8ab750af", + "uuid": "d038e3d7-ac8e-42b1-abbe-f3a9ab617245", "control-id": "pcidss_4_8-2.1", "description": "The description for control-id pcidss_4_8-2.1.", "props": [ @@ -5847,7 +5830,7 @@ ] }, { - "uuid": "016822a5-668e-48ef-bc75-eeeb77b9cbf0", + "uuid": "c1a82022-062c-4211-ad26-28ddf43e8506", "control-id": "pcidss_4_8-2.2", "description": "This requirement is complemented by 8.2.1 and related to 8.3.5.", "props": [ @@ -5874,7 +5857,7 @@ ] }, { - "uuid": "f087f021-f7af-4f57-9628-7b07fd95fbae", + "uuid": "281c4f53-d6b4-4b6d-ab10-7e1f129de9d2", "control-id": "pcidss_4_8-2.3", "description": "The description for control-id pcidss_4_8-2.3.", "props": [ @@ -5887,7 +5870,7 @@ ] }, { - "uuid": "a97960b0-e19b-47dd-abaf-bb0c730d70a4", + "uuid": "9627a0be-8ec9-40e4-a40a-e8f52931db72", "control-id": "pcidss_4_8-2.4", "description": "The description for control-id pcidss_4_8-2.4.", "props": [ @@ -5900,7 +5883,7 @@ ] }, { - "uuid": "52f0afe9-4a76-4012-be57-b608a22ce173", + "uuid": "4de63f9d-d435-4614-bfd4-fa24fd433ecc", "control-id": "pcidss_4_8-2.5", "description": "The description for control-id pcidss_4_8-2.5.", "props": [ @@ -5913,7 +5896,7 @@ ] }, { - "uuid": "b4ece7b7-14c1-40c3-8b6c-8510581b40fc", + "uuid": "902f6002-5b74-4b02-bc91-25ef9ff79974", "control-id": "pcidss_4_8-2.6", "description": "Also related to requirements 2.2.2 and 8.3.5.", "props": [ @@ -5935,7 +5918,7 @@ ] }, { - "uuid": "09e5fb16-b271-4679-bb64-6314f9366576", + "uuid": "3c55161b-e936-4b79-997e-43480843c4b6", "control-id": "pcidss_4_8-2.7", "description": "The description for control-id pcidss_4_8-2.7.", "props": [ @@ -5948,7 +5931,7 @@ ] }, { - "uuid": "41628b59-80d1-4242-aded-c55ab27736f3", + "uuid": "e63bf62a-df91-404f-be9a-d88748f9508d", "control-id": "pcidss_4_8-2.8", "description": "No notes for control-id 8.2.8.", "props": [ @@ -6010,7 +5993,7 @@ ] }, { - "uuid": "fa1da1b0-388a-4b36-a38e-96ecf5f465d8", + "uuid": "c9f19bbd-5081-4cb8-929e-1c5be9490491", "control-id": "pcidss_4_8-3.1", "description": "No notes for control-id 8.3.1.", "props": [ @@ -6037,7 +6020,7 @@ ] }, { - "uuid": "f6759ed8-6fd1-43aa-ac24-a805c6659523", + "uuid": "1976ed32-95ea-4371-989a-0dfe7d418328", "control-id": "pcidss_4_8-3.2", "description": "There are similar rules that might be redundant for some distros.", "props": [ @@ -6069,7 +6052,7 @@ ] }, { - "uuid": "346e8f2a-1cf7-4379-8aa8-768ce1159e97", + "uuid": "ccc3c987-5953-4e9a-b8e7-4a14fe6cb422", "control-id": "pcidss_4_8-3.3", "description": "The description for control-id pcidss_4_8-3.3.", "props": [ @@ -6082,7 +6065,7 @@ ] }, { - "uuid": "22404ba3-834b-4683-87a5-1d0f024996f8", + "uuid": "edca3def-8c1b-492a-9241-0c5c7ebd4415", "control-id": "pcidss_4_8-3.4", "description": "No notes for control-id 8.3.4.", "props": [ @@ -6109,7 +6092,7 @@ ] }, { - "uuid": "46d39e76-b5a2-40d4-a4ca-b5243d92cd53", + "uuid": "38158aa6-13f1-4b32-ae87-4014042d928c", "control-id": "pcidss_4_8-3.5", "description": "Also related to requirement 2.2.2, 8.2.2 and 8.2.6.", "props": [ @@ -6126,7 +6109,7 @@ ] }, { - "uuid": "752fcbdb-fad0-48f6-976e-f405b5dafa89", + "uuid": "04e65f9e-13d8-446b-8e3f-5df7d4917dfc", "control-id": "pcidss_4_8-3.6", "description": "This requirement is not intended to apply to:\n- User accounts on point-of-sale terminals that have access to only one card number at a\ntime to facilitate a single transaction (such as IDs used by cashiers on point-of-sale\nterminals).\n- Application or system accounts, which are governed by requirements in section 8.6.", "props": [ @@ -6153,7 +6136,7 @@ ] }, { - "uuid": "c633295b-add3-4bba-bd4d-f78b8d565fd0", + "uuid": "52ab2531-600c-4d37-9596-6daff32ae7f9", "control-id": "pcidss_4_8-3.7", "description": "This requirement is not intended to apply to user accounts on point-of-sale terminals that\nhave access to only one card number at a time to facilitate a single transaction (such as\nIDs used by cashiers on point-of-sale terminals).\nFor RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be\nprefered in detriment of accounts_password_pam_unix_remember. Using both should not create\nconflict but is unnecessary and the last should be filtered out from the profile.", "props": [ @@ -6180,7 +6163,7 @@ ] }, { - "uuid": "97d753f9-d2d1-499e-9657-4a4c9419cac6", + "uuid": "5b34d24e-bf62-44b9-af82-45c7dcb28cb1", "control-id": "pcidss_4_8-3.8", "description": "The description for control-id pcidss_4_8-3.8.", "props": [ @@ -6193,7 +6176,7 @@ ] }, { - "uuid": "dd8de82d-ee40-4780-9846-bcf478f02737", + "uuid": "09799475-70ba-4945-8f01-afffc4109759", "control-id": "pcidss_4_8-3.9", "description": "The requirement does not explicitily define the number of days before the password\nexpiration to warn the users, but the relevant rules were selected here as they do not\ncause any problems in combination with password lifetime rules.", "props": [ @@ -6225,7 +6208,7 @@ ] }, { - "uuid": "6ca4f699-af8f-4a45-b75f-26e0f62e1533", + "uuid": "d9e6214b-d1e9-47a3-9135-e9ae2a2770ba", "control-id": "pcidss_4_8-3.10.1", "description": "This requirement is already covered by 8.3.9.", "props": [ @@ -6237,7 +6220,7 @@ ] }, { - "uuid": "a55466bc-2fdc-42d0-9437-97c56181bcf6", + "uuid": "7d76ea18-149d-454f-a91e-6ac7b1ad2275", "control-id": "pcidss_4_8-3.11", "description": "The description for control-id pcidss_4_8-3.11.", "props": [ @@ -6250,7 +6233,7 @@ ] }, { - "uuid": "3a402721-48a7-4148-8834-4daefbaf3f32", + "uuid": "f93d41ff-4dea-479f-984c-3f7eb28ba329", "control-id": "pcidss_4_8-4.1", "description": "No notes for control-id 8.4.1.", "props": [ @@ -6262,7 +6245,7 @@ ] }, { - "uuid": "da2bc7a4-21e5-463c-9d75-8bab01b0ca44", + "uuid": "5aa86df5-0827-4a99-aa04-c71a2a6a3f5d", "control-id": "pcidss_4_8-4.2", "description": "The description for control-id pcidss_4_8-4.2.", "props": [ @@ -6275,7 +6258,7 @@ ] }, { - "uuid": "c36f7b62-c325-478b-b31c-d20e64fa98b8", + "uuid": "e63410f5-b797-4c17-9aba-f22e6297137f", "control-id": "pcidss_4_8-4.3", "description": "The description for control-id pcidss_4_8-4.3.", "props": [ @@ -6288,7 +6271,7 @@ ] }, { - "uuid": "290a5137-bd79-4329-a93b-200cbeb5d3a9", + "uuid": "3737a9ff-7a43-43f3-9d94-eeb3921dec34", "control-id": "pcidss_4_8-5.1", "description": "The description for control-id pcidss_4_8-5.1.", "props": [ @@ -6301,7 +6284,7 @@ ] }, { - "uuid": "b553d50c-1e3c-4293-bd8c-e89efcbd4c77", + "uuid": "ff8cb47c-9c1c-4943-9fd6-c2846235a491", "control-id": "pcidss_4_8-6.1", "description": "This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system\naccounts usage is restricted. Exceptions to system accounts should be manually checked to\nensure the requirements in description. This requirement although implements some extra\ncontrols regarding root account.", "props": [ @@ -6328,7 +6311,7 @@ ] }, { - "uuid": "24e3d897-c684-4bb8-89e3-944f335a20d3", + "uuid": "7ec078cc-701c-4532-9e02-aaa4d17612e0", "control-id": "pcidss_4_8-6.2", "description": "The description for control-id pcidss_4_8-6.2.", "props": [ @@ -6341,7 +6324,7 @@ ] }, { - "uuid": "a5aaa025-3b2c-4278-8ec6-90ac9e564b55", + "uuid": "b2a62ffc-b12f-4eac-8e8a-458652b201d8", "control-id": "pcidss_4_8-6.3", "description": "Related to requirements 8.3.6 and 8.3.9.", "props": [ @@ -6353,7 +6336,7 @@ ] }, { - "uuid": "09ba66d3-8d5a-403a-aea4-192e1dd6bbef", + "uuid": "4f5b64b8-5e0b-47c6-94a4-d55f328de3f5", "control-id": "pcidss_4_9-1.1", "description": "The description for control-id pcidss_4_9-1.1.", "props": [ @@ -6366,7 +6349,7 @@ ] }, { - "uuid": "637276fb-ebbc-4b3c-b542-088524658782", + "uuid": "c3aaca99-0b59-4672-84cb-fd53b21fab91", "control-id": "pcidss_4_9-1.2", "description": "The description for control-id pcidss_4_9-1.2.", "props": [ @@ -6379,7 +6362,7 @@ ] }, { - "uuid": "49d262df-3366-45c2-80c0-d86185a48d06", + "uuid": "99c77010-1480-42bc-8cdd-b97d644b26e5", "control-id": "pcidss_4_9-2.1.1", "description": "The description for control-id pcidss_4_9-2.1.1.", "props": [ @@ -6392,7 +6375,7 @@ ] }, { - "uuid": "e17b9bc9-8592-4cef-bc4b-a8c85f74f89a", + "uuid": "69ab7817-f3b3-433a-93ec-5d7de43f904a", "control-id": "pcidss_4_9-2.2", "description": "The description for control-id pcidss_4_9-2.2.", "props": [ @@ -6405,7 +6388,7 @@ ] }, { - "uuid": "798d92c4-8bd7-458b-b8db-b607bd5e01f5", + "uuid": "7368cf74-b4c9-40d7-baab-afc8f4737752", "control-id": "pcidss_4_9-2.3", "description": "The description for control-id pcidss_4_9-2.3.", "props": [ @@ -6418,7 +6401,7 @@ ] }, { - "uuid": "00a0f62a-290a-4b46-b059-84b96b40ba62", + "uuid": "d73a56cc-d84b-4b25-a09e-6b1d71c3d844", "control-id": "pcidss_4_9-2.4", "description": "The description for control-id pcidss_4_9-2.4.", "props": [ @@ -6431,7 +6414,7 @@ ] }, { - "uuid": "c255a8f7-2ab1-4952-84d4-4c83cecd4f18", + "uuid": "4e1b34cb-0591-49aa-8e30-137e3954483a", "control-id": "pcidss_4_9-3.1.1", "description": "The description for control-id pcidss_4_9-3.1.1.", "props": [ @@ -6444,7 +6427,7 @@ ] }, { - "uuid": "cc37b3f2-22d8-4c6f-aa5f-2941da178d24", + "uuid": "9fc71d4e-a78f-4ecd-a5be-318722432b64", "control-id": "pcidss_4_9-3.2", "description": "The description for control-id pcidss_4_9-3.2.", "props": [ @@ -6457,7 +6440,7 @@ ] }, { - "uuid": "25951a44-5023-4bd7-b9e5-d87c0e317614", + "uuid": "6b379c47-15c6-4cfe-9b95-f3ec5bb24a16", "control-id": "pcidss_4_9-3.3", "description": "The description for control-id pcidss_4_9-3.3.", "props": [ @@ -6470,7 +6453,7 @@ ] }, { - "uuid": "15f6bdab-5742-4809-874d-96cc22bac7c3", + "uuid": "e890a786-d95f-4291-8ed8-1349b1ea9d43", "control-id": "pcidss_4_9-3.4", "description": "The description for control-id pcidss_4_9-3.4.", "props": [ @@ -6483,7 +6466,7 @@ ] }, { - "uuid": "d5444871-588a-4bd0-8b8f-efd0f303a18c", + "uuid": "4789cadc-943a-4eef-a778-e203accda45a", "control-id": "pcidss_4_9-4.1.1", "description": "The description for control-id pcidss_4_9-4.1.1.", "props": [ @@ -6496,7 +6479,7 @@ ] }, { - "uuid": "097d7fca-c99f-443b-8b3c-995ef4c279ff", + "uuid": "cf483c4e-5283-47ee-b325-f6c85ba83b96", "control-id": "pcidss_4_9-4.1.2", "description": "The description for control-id pcidss_4_9-4.1.2.", "props": [ @@ -6509,7 +6492,7 @@ ] }, { - "uuid": "7230f99f-74dd-44fd-b7d6-37cc34159258", + "uuid": "faf338de-7312-4ef4-9cf5-4bd3c39232f9", "control-id": "pcidss_4_9-4.2", "description": "The description for control-id pcidss_4_9-4.2.", "props": [ @@ -6522,7 +6505,7 @@ ] }, { - "uuid": "ebce5d06-ac62-4b78-b1f5-f73cab9859bb", + "uuid": "63860e6a-3793-4302-9b8e-0f674f1e08c7", "control-id": "pcidss_4_9-4.3", "description": "The description for control-id pcidss_4_9-4.3.", "props": [ @@ -6535,7 +6518,7 @@ ] }, { - "uuid": "ec0f2557-4b9d-4463-afaf-8e40c3b8b141", + "uuid": "76f7f4dd-944c-4f12-8c1f-08f4940cc574", "control-id": "pcidss_4_9-4.4", "description": "The description for control-id pcidss_4_9-4.4.", "props": [ @@ -6548,7 +6531,7 @@ ] }, { - "uuid": "a2a4a1b9-7b00-4a43-9996-7c61a84c5d94", + "uuid": "60496879-fa59-4070-a95b-76c676150d72", "control-id": "pcidss_4_9-4.5.1", "description": "The description for control-id pcidss_4_9-4.5.1.", "props": [ @@ -6561,7 +6544,7 @@ ] }, { - "uuid": "6c107413-5708-4a62-9f58-8afb2e50d620", + "uuid": "9c75f9c0-8830-4248-a402-13a5cc936102", "control-id": "pcidss_4_9-4.6", "description": "The description for control-id pcidss_4_9-4.6.", "props": [ @@ -6574,7 +6557,7 @@ ] }, { - "uuid": "5e31a577-4238-41b9-83f8-126b4fc9490a", + "uuid": "4aa6ccb4-c012-4c38-acd2-3261ec8c0043", "control-id": "pcidss_4_9-4.7", "description": "The description for control-id pcidss_4_9-4.7.", "props": [ @@ -6587,7 +6570,7 @@ ] }, { - "uuid": "84bab62e-47cb-4013-a11d-ab2cf85af226", + "uuid": "898b3827-5b4e-4358-83f1-bbca4128e847", "control-id": "pcidss_4_9-5.1.1", "description": "The description for control-id pcidss_4_9-5.1.1.", "props": [ @@ -6600,7 +6583,7 @@ ] }, { - "uuid": "fb259143-ddcb-4ad4-a4dc-0b6448752925", + "uuid": "d84033e8-7f1c-46c6-a509-0caf75451ce2", "control-id": "pcidss_4_9-5.1.2.1", "description": "The description for control-id pcidss_4_9-5.1.2.1.", "props": [ @@ -6613,7 +6596,7 @@ ] }, { - "uuid": "84b9e3e0-235d-4272-bfd4-a0dbf8d4a1dd", + "uuid": "82f24e93-abb9-4386-a5fc-6ba1065ae1d8", "control-id": "pcidss_4_9-5.1.3", "description": "The description for control-id pcidss_4_9-5.1.3.", "props": [ @@ -6626,7 +6609,7 @@ ] }, { - "uuid": "3b5bdaa6-a17f-4913-a9ec-a71e639efd3c", + "uuid": "4effa58c-af3f-4498-a7d2-1d01bb8aa8a0", "control-id": "pcidss_4_10-1.1", "description": "The description for control-id pcidss_4_10-1.1.", "props": [ @@ -6639,7 +6622,7 @@ ] }, { - "uuid": "4b6e479a-6b91-46c8-ad7a-7a183f2cc469", + "uuid": "93976257-3ff0-45c8-92d6-7aa9ee846369", "control-id": "pcidss_4_10-1.2", "description": "The description for control-id pcidss_4_10-1.2.", "props": [ @@ -6652,7 +6635,7 @@ ] }, { - "uuid": "654194b3-4b9b-4933-b3bd-3eadd7762a2e", + "uuid": "715d223a-27ed-4d00-90bf-6cd616dbcb35", "control-id": "pcidss_4_10-2.1.1", "description": "The description for control-id pcidss_4_10-2.1.1.", "props": [ @@ -6665,7 +6648,7 @@ ] }, { - "uuid": "17f00d84-4b78-4cf2-a9a5-130464123da5", + "uuid": "08af4915-b915-41a3-a816-4651c62f4191", "control-id": "pcidss_4_10-2.1.2", "description": "Not all privileged commands have suid or sgid enabled. We probably want to include more\nrules for this requirement.", "props": [ @@ -6682,7 +6665,7 @@ ] }, { - "uuid": "c86cc4e8-f503-4fb3-a495-9ca85c0c8b21", + "uuid": "b03b2ea6-0a96-4d22-819c-d2f902e33e1d", "control-id": "pcidss_4_10-2.1.3", "description": "No notes for control-id 10.2.1.3.", "props": [ @@ -6729,7 +6712,7 @@ ] }, { - "uuid": "8d0c39c7-f712-43d9-bbef-1c40bb9a1f4d", + "uuid": "959e2b8f-ca62-4004-857e-c4240b773905", "control-id": "pcidss_4_10-2.1.4", "description": "No notes for control-id 10.2.1.4.", "props": [ @@ -6746,7 +6729,7 @@ ] }, { - "uuid": "a8b4333c-fd5f-41c8-aea0-57cc7a15c512", + "uuid": "3c597fb4-a834-4971-8ada-418349c36a1f", "control-id": "pcidss_4_10-2.1.5", "description": "No notes for control-id 10.2.1.5.", "props": [ @@ -6788,7 +6771,7 @@ ] }, { - "uuid": "3dd1efe6-11dc-424a-8a0c-887c54ac3de7", + "uuid": "a1ab3474-c794-452e-a4d6-b6995632d119", "control-id": "pcidss_4_10-2.1.6", "description": "The description for control-id pcidss_4_10-2.1.6.", "props": [ @@ -6801,7 +6784,7 @@ ] }, { - "uuid": "91fb78a7-634c-4138-92bc-1bcdad43d1cb", + "uuid": "48dd5c26-fe10-498c-be0b-df48869cd7d3", "control-id": "pcidss_4_10-2.1.7", "description": "There are enough rules to capture deletion events but not for creation events.\nThis requirement needs to be better investigated to confirm which additional rules would\nsatistfy the requirement.", "props": [ @@ -6843,7 +6826,7 @@ ] }, { - "uuid": "a6f418a1-c849-44a3-ae2b-1205d620212f", + "uuid": "089cbbe2-7a2e-4ac2-9341-4c87c416f950", "control-id": "pcidss_4_10-2.2", "description": "Standard settings for audit should be enough.", "props": [ @@ -6860,7 +6843,7 @@ ] }, { - "uuid": "4dd7d910-8531-460b-a5f3-323cea4dc558", + "uuid": "ef2c4fbf-6dae-4fcd-b8aa-bc0e9f7651e0", "control-id": "pcidss_4_10-3.1", "description": "No notes for control-id 10.3.1.", "props": [ @@ -6887,7 +6870,7 @@ ] }, { - "uuid": "02056887-68a4-44f6-b9fe-42606c10d3a7", + "uuid": "e5ec0561-d9ed-4afe-a5b4-918980ed07c2", "control-id": "pcidss_4_10-3.2", "description": "No notes for control-id 10.3.2.", "props": [ @@ -6924,7 +6907,7 @@ ] }, { - "uuid": "776885c4-4274-4d96-82ee-ebc0b2e1041d", + "uuid": "204d833e-9b9e-4faf-9b8e-0b8c2ddac765", "control-id": "pcidss_4_10-3.3", "description": "Although the technologies in general allow to send logs to a centralized server, some\nparameters for this configuration are specific to each site policy and therefore the\nrequirement demands manual assessment.", "props": [ @@ -6946,7 +6929,7 @@ ] }, { - "uuid": "d3ea883f-67a3-486e-94d1-0f422f0260cb", + "uuid": "d7e689b5-4161-418e-95e8-4c4deffc5bfc", "control-id": "pcidss_4_10-3.4", "description": "No notes for control-id 10.3.4.", "props": [ @@ -7033,7 +7016,7 @@ ] }, { - "uuid": "03f9de9b-9d47-4b0c-a9d0-d0ef665716b4", + "uuid": "4eef7c5d-f1dd-42e0-9fb1-8fed802bc5b0", "control-id": "pcidss_4_10-4.1.1", "description": "The description for control-id pcidss_4_10-4.1.1.", "props": [ @@ -7046,7 +7029,7 @@ ] }, { - "uuid": "b4203c7a-e9f3-4e7d-a090-a01a67063c52", + "uuid": "05b94917-335c-4104-bbab-a93119f0b1a5", "control-id": "pcidss_4_10-4.2.1", "description": "The description for control-id pcidss_4_10-4.2.1.", "props": [ @@ -7059,7 +7042,7 @@ ] }, { - "uuid": "51608a33-ef5f-4b96-8bff-0e825ef51af2", + "uuid": "499efe49-fb38-4e70-9aa6-4c3e4d7e1a0b", "control-id": "pcidss_4_10-4.3", "description": "The description for control-id pcidss_4_10-4.3.", "props": [ @@ -7072,7 +7055,7 @@ ] }, { - "uuid": "89359aa7-0617-4607-8df6-70372af988e5", + "uuid": "77da86de-15a0-494b-91ca-c621c6c6b32e", "control-id": "pcidss_4_10-5.1", "description": "It is not simple to ensure 12 months history is present in each system but the rules in\nthis requirement ensures the logs are not lost without administrators awareness.", "props": [ @@ -7109,7 +7092,7 @@ ] }, { - "uuid": "66496f89-7131-42c1-9dc6-6c5c1539b5ef", + "uuid": "af57514c-e9dc-4007-8e0e-518bc3eafbe5", "control-id": "pcidss_4_10-6.1", "description": "Maybe it is possible to optmize some similar rules related to ntp.", "props": [ @@ -7126,7 +7109,7 @@ ] }, { - "uuid": "b8437b83-4172-4e9f-981e-9f9ad3dd90ca", + "uuid": "7074798a-ea0b-4778-80eb-f8ec3cd62723", "control-id": "pcidss_4_10-6.2", "description": "The selected rules might need updates in order to restrict their platform applicability\nto avoid conflicts.", "props": [ @@ -7143,7 +7126,7 @@ ] }, { - "uuid": "7ad901b0-49f4-43b1-a1fa-1dd6fc5d81ad", + "uuid": "119482da-4fc9-448e-b615-9dcccc6a6bab", "control-id": "pcidss_4_10-6.3", "description": "No notes for control-id 10.6.3.", "props": [ @@ -7185,7 +7168,7 @@ ] }, { - "uuid": "0bf0fef0-8d54-42c5-bdb7-2c6aaca0db02", + "uuid": "9184c445-af72-47de-aa7c-05e2f977cff5", "control-id": "pcidss_4_10-7.1", "description": "The description for control-id pcidss_4_10-7.1.", "props": [ @@ -7198,7 +7181,7 @@ ] }, { - "uuid": "cbe3a5a7-ec2d-44f7-8659-ea327ebc61c5", + "uuid": "cb93d961-3c5e-4bbf-8b46-0ec7864aae1f", "control-id": "pcidss_4_10-7.2", "description": "No notes for control-id 10.7.2.", "props": [ @@ -7220,7 +7203,7 @@ ] }, { - "uuid": "1fc1035f-e9d2-452e-83df-4237dad3681a", + "uuid": "e910c99b-0f80-436d-a429-747daafd398d", "control-id": "pcidss_4_10-7.3", "description": "The description for control-id pcidss_4_10-7.3.", "props": [ @@ -7233,7 +7216,7 @@ ] }, { - "uuid": "789c7d26-8824-40e5-a3da-ecdd5fdacf18", + "uuid": "e33ebecd-7321-4f9a-957f-fea160e60cc3", "control-id": "pcidss_4_11-1.1", "description": "The description for control-id pcidss_4_11-1.1.", "props": [ @@ -7246,7 +7229,7 @@ ] }, { - "uuid": "31c07c6c-5224-4aca-8288-2f558607ee1d", + "uuid": "3e6f2b0b-6d3c-4367-9a40-85e33a16e44b", "control-id": "pcidss_4_11-1.2", "description": "The description for control-id pcidss_4_11-1.2.", "props": [ @@ -7259,7 +7242,7 @@ ] }, { - "uuid": "a48f38d7-0e1d-4b73-ba22-e0dad5694573", + "uuid": "58ffe27c-8d29-4375-9830-4800229fd90a", "control-id": "pcidss_4_11-2.1", "description": "The description for control-id pcidss_4_11-2.1.", "props": [ @@ -7272,7 +7255,7 @@ ] }, { - "uuid": "2d7f7e88-3507-45c0-916d-fc80514a50d0", + "uuid": "3f63e69c-fcbf-4380-ae9c-1edc235514e5", "control-id": "pcidss_4_11-2.2", "description": "The description for control-id pcidss_4_11-2.2.", "props": [ @@ -7285,7 +7268,7 @@ ] }, { - "uuid": "ff62c7d7-1089-46bd-b055-7e5d17ded42d", + "uuid": "79accd51-21a6-4c1c-be63-519fa332707d", "control-id": "pcidss_4_11-3.1.1", "description": "The description for control-id pcidss_4_11-3.1.1.", "props": [ @@ -7298,7 +7281,7 @@ ] }, { - "uuid": "74de98f3-b6bf-427e-a298-4607c25ea00b", + "uuid": "41707c9d-17e0-4f10-a7ba-00a14cdaca95", "control-id": "pcidss_4_11-3.1.2", "description": "The description for control-id pcidss_4_11-3.1.2.", "props": [ @@ -7311,7 +7294,7 @@ ] }, { - "uuid": "fabf3a4f-b71b-408a-9036-5518831ff64b", + "uuid": "e7e4b8f2-a95f-4535-9337-07f26b93f0f1", "control-id": "pcidss_4_11-3.1.3", "description": "The description for control-id pcidss_4_11-3.1.3.", "props": [ @@ -7324,7 +7307,7 @@ ] }, { - "uuid": "c6f70b28-1744-49d6-8554-c1ad75fcd6ce", + "uuid": "168ad02c-cb49-4286-ab5d-733d55ffada9", "control-id": "pcidss_4_11-3.2.1", "description": "The description for control-id pcidss_4_11-3.2.1.", "props": [ @@ -7337,7 +7320,7 @@ ] }, { - "uuid": "b7256a48-f1c8-4790-b97e-d504313241db", + "uuid": "43e394ee-1edb-4c39-9f48-23b2b9297aa4", "control-id": "pcidss_4_11-4.1", "description": "The description for control-id pcidss_4_11-4.1.", "props": [ @@ -7350,7 +7333,7 @@ ] }, { - "uuid": "2b7857b0-0b59-4cb8-a046-ef3123e3a89b", + "uuid": "c7b55061-7d86-41b0-be40-7d4341a65232", "control-id": "pcidss_4_11-4.2", "description": "The description for control-id pcidss_4_11-4.2.", "props": [ @@ -7363,7 +7346,7 @@ ] }, { - "uuid": "876b2f84-a724-4ddb-ad70-4bf586660f58", + "uuid": "a83678db-f9e1-4613-862c-2c45462a0b55", "control-id": "pcidss_4_11-4.3", "description": "The description for control-id pcidss_4_11-4.3.", "props": [ @@ -7376,7 +7359,7 @@ ] }, { - "uuid": "6fbf404e-dc81-4ea5-8fbf-aca5aa0f1b69", + "uuid": "6dc3604f-dd13-4b0e-833b-d2883cd6c45b", "control-id": "pcidss_4_11-4.4", "description": "The description for control-id pcidss_4_11-4.4.", "props": [ @@ -7389,7 +7372,7 @@ ] }, { - "uuid": "f711ac7a-caf4-4a48-9df5-79cc7712e5dc", + "uuid": "811e8d8f-eb9d-44f6-a531-eb32c4377147", "control-id": "pcidss_4_11-4.5", "description": "The description for control-id pcidss_4_11-4.5.", "props": [ @@ -7402,7 +7385,7 @@ ] }, { - "uuid": "50040671-d471-4485-b1be-5b07e4403162", + "uuid": "f27d8561-410f-48ff-8f99-3d26825eab4a", "control-id": "pcidss_4_11-4.6", "description": "The description for control-id pcidss_4_11-4.6.", "props": [ @@ -7415,7 +7398,7 @@ ] }, { - "uuid": "89c662e9-91d9-432a-ac14-ba3e79706388", + "uuid": "f80f4b0f-f5ad-4fc4-a974-b201d0610c81", "control-id": "pcidss_4_11-4.7", "description": "The description for control-id pcidss_4_11-4.7.", "props": [ @@ -7428,7 +7411,7 @@ ] }, { - "uuid": "8f0af948-cc35-4d29-850f-23265f7a4f50", + "uuid": "a1dc36a7-d26b-406b-95e5-6d72ac3c65a6", "control-id": "pcidss_4_11-5.1.1", "description": "The description for control-id pcidss_4_11-5.1.1.", "props": [ @@ -7441,7 +7424,7 @@ ] }, { - "uuid": "722ac26b-88ff-4ac9-9d42-716d65fd87f9", + "uuid": "60297a61-4672-4542-944a-0d7b085042c6", "control-id": "pcidss_4_11-5.2", "description": "No notes for control-id 11.5.2.", "props": [ @@ -7478,7 +7461,7 @@ ] }, { - "uuid": "ed3bf10e-8913-4c61-8fd9-fd204ab51468", + "uuid": "50cd4619-f089-4de2-b4b6-36bc87f30033", "control-id": "pcidss_4_11-6.1", "description": "The description for control-id pcidss_4_11-6.1.", "props": [ @@ -7491,7 +7474,7 @@ ] }, { - "uuid": "b88f1d8a-1169-4c39-a659-c85b90d64509", + "uuid": "3a2700d8-ba8b-431b-bc3e-a8750bbce9dd", "control-id": "pcidss_4_12-1.1", "description": "The description for control-id pcidss_4_12-1.1.", "props": [ @@ -7504,7 +7487,7 @@ ] }, { - "uuid": "671e1bd7-283d-4411-9707-38e264d4c120", + "uuid": "36c877ec-483d-4465-bf63-28e3ba890d3b", "control-id": "pcidss_4_12-1.2", "description": "The description for control-id pcidss_4_12-1.2.", "props": [ @@ -7517,7 +7500,7 @@ ] }, { - "uuid": "6cf1ecc4-f4ed-4f05-92fb-4b1c03fac499", + "uuid": "e7266fe4-029e-46cc-93b3-12e83aaf28d0", "control-id": "pcidss_4_12-1.3", "description": "The description for control-id pcidss_4_12-1.3.", "props": [ @@ -7530,7 +7513,7 @@ ] }, { - "uuid": "964f8e33-786d-4c49-a36a-8e969a6e047d", + "uuid": "f554a354-3b2b-4d92-8969-652816c07284", "control-id": "pcidss_4_12-1.4", "description": "The description for control-id pcidss_4_12-1.4.", "props": [ @@ -7543,7 +7526,7 @@ ] }, { - "uuid": "cc2616ea-d9a4-4b00-ae05-bd7c214ff07d", + "uuid": "4e775339-c986-4499-9a06-2f9aae01a0bb", "control-id": "pcidss_4_12-2.1", "description": "The description for control-id pcidss_4_12-2.1.", "props": [ @@ -7556,7 +7539,7 @@ ] }, { - "uuid": "4ddadb3c-774f-4bc3-b0fa-ab959e54fca4", + "uuid": "e0191413-1e42-42b5-9343-c4d67d4a3642", "control-id": "pcidss_4_12-3.1", "description": "The description for control-id pcidss_4_12-3.1.", "props": [ @@ -7569,7 +7552,7 @@ ] }, { - "uuid": "f257f507-9bbb-4513-9d89-45650ebb9a33", + "uuid": "6449c9c9-9387-4e92-a894-0e2f1343d85e", "control-id": "pcidss_4_12-3.2", "description": "The description for control-id pcidss_4_12-3.2.", "props": [ @@ -7582,7 +7565,7 @@ ] }, { - "uuid": "dd4affc1-45c2-4941-872a-a5ff5506fff4", + "uuid": "99ba9807-5d18-46a9-a7a0-3c0021d502b2", "control-id": "pcidss_4_12-3.3", "description": "The description for control-id pcidss_4_12-3.3.", "props": [ @@ -7595,7 +7578,7 @@ ] }, { - "uuid": "c37a8cfb-2589-46de-8416-d71cdaddc871", + "uuid": "eb5f62b7-b373-4e10-a0e0-cc913916f2fb", "control-id": "pcidss_4_12-3.4", "description": "The description for control-id pcidss_4_12-3.4.", "props": [ @@ -7608,7 +7591,7 @@ ] }, { - "uuid": "1af64879-5557-4946-845d-694f805c92fa", + "uuid": "8b5e0e24-3998-4d89-8a56-c93ddadf50d9", "control-id": "pcidss_4_12-4.1", "description": "The description for control-id pcidss_4_12-4.1.", "props": [ @@ -7621,7 +7604,7 @@ ] }, { - "uuid": "ccf15aab-bdc3-4053-bae2-35ad0d86afcb", + "uuid": "1b6835f3-57da-4957-96b1-7df5ac0fc240", "control-id": "pcidss_4_12-4.2.1", "description": "The description for control-id pcidss_4_12-4.2.1.", "props": [ @@ -7634,7 +7617,7 @@ ] }, { - "uuid": "cc25417b-5f8f-4f9d-8193-0897ecf1d2ec", + "uuid": "80a01254-9a3e-47e4-9a1c-f680fd81cbb2", "control-id": "pcidss_4_12-5.1", "description": "The description for control-id pcidss_4_12-5.1.", "props": [ @@ -7647,7 +7630,7 @@ ] }, { - "uuid": "f331a3e8-774c-410e-9f61-8edb0eb970c3", + "uuid": "b70463f2-6aca-496e-845b-c7531cc4edb1", "control-id": "pcidss_4_12-5.2.1", "description": "The description for control-id pcidss_4_12-5.2.1.", "props": [ @@ -7660,7 +7643,7 @@ ] }, { - "uuid": "ecd24507-585b-48ea-b7a0-575bc57fb872", + "uuid": "a2d1e999-97dc-4d7e-a9ba-bda6eac7fcf2", "control-id": "pcidss_4_12-5.3", "description": "The description for control-id pcidss_4_12-5.3.", "props": [ @@ -7673,7 +7656,7 @@ ] }, { - "uuid": "5bf81a8c-d6ae-4144-a1aa-58e808089d8b", + "uuid": "f8890c60-c728-4e34-aad2-059f7cf73639", "control-id": "pcidss_4_12-6.1", "description": "The description for control-id pcidss_4_12-6.1.", "props": [ @@ -7686,7 +7669,7 @@ ] }, { - "uuid": "be82e8c7-5e9b-4ca4-8e29-993545402120", + "uuid": "c66e0987-64e9-4425-95ab-94b8bb6f8d10", "control-id": "pcidss_4_12-6.2", "description": "The description for control-id pcidss_4_12-6.2.", "props": [ @@ -7699,7 +7682,7 @@ ] }, { - "uuid": "8d15f2b0-c860-4fd2-9276-e1af04960c64", + "uuid": "581db03a-b09c-49dc-8380-5eaf1842dc27", "control-id": "pcidss_4_12-6.3.1", "description": "The description for control-id pcidss_4_12-6.3.1.", "props": [ @@ -7712,7 +7695,7 @@ ] }, { - "uuid": "54c396bf-4644-4ccc-8abe-9b72e383024b", + "uuid": "82e1f57f-41c5-4070-be28-17cd3ca4d37d", "control-id": "pcidss_4_12-6.3.2", "description": "The description for control-id pcidss_4_12-6.3.2.", "props": [ @@ -7725,7 +7708,7 @@ ] }, { - "uuid": "f2ffa0d7-f6c4-4038-aa95-3eaa9fbeef68", + "uuid": "7dff7a07-1c91-448f-8d77-40eb360624c6", "control-id": "pcidss_4_12-7.1", "description": "The description for control-id pcidss_4_12-7.1.", "props": [ @@ -7738,7 +7721,7 @@ ] }, { - "uuid": "4d5ec9f4-8f98-475a-bf24-240eaa5a2920", + "uuid": "8d21d521-aeea-4aa8-84fc-d037871c3cf8", "control-id": "pcidss_4_12-8.1", "description": "The description for control-id pcidss_4_12-8.1.", "props": [ @@ -7751,7 +7734,7 @@ ] }, { - "uuid": "976303d5-f55a-41eb-bc65-279d9bccb87c", + "uuid": "81703446-a658-4161-b600-d3a3514ef05b", "control-id": "pcidss_4_12-8.2", "description": "The description for control-id pcidss_4_12-8.2.", "props": [ @@ -7764,7 +7747,7 @@ ] }, { - "uuid": "9c59d3ff-d7f3-4264-8956-7aaed7ae94db", + "uuid": "0d4aa7df-c434-4caa-960c-be410ed7bac5", "control-id": "pcidss_4_12-8.3", "description": "The description for control-id pcidss_4_12-8.3.", "props": [ @@ -7777,7 +7760,7 @@ ] }, { - "uuid": "a3092c78-6a8f-4cc7-8712-3ba3ce0a343e", + "uuid": "ffda3b51-846b-4318-8dba-141ae7699b10", "control-id": "pcidss_4_12-8.4", "description": "The description for control-id pcidss_4_12-8.4.", "props": [ @@ -7790,7 +7773,7 @@ ] }, { - "uuid": "94cf7583-3322-47b0-b344-ec55f11c46ce", + "uuid": "de8fb2e6-4a63-4fe7-ad81-52c9a50dbe1a", "control-id": "pcidss_4_12-8.5", "description": "The description for control-id pcidss_4_12-8.5.", "props": [ @@ -7803,7 +7786,7 @@ ] }, { - "uuid": "12f9e2d7-eae4-42f4-aa58-4e7db394a83d", + "uuid": "7d401b38-f4f7-4e20-ab54-86ea959aa1a2", "control-id": "pcidss_4_12-9.1", "description": "The description for control-id pcidss_4_12-9.1.", "props": [ @@ -7816,7 +7799,7 @@ ] }, { - "uuid": "c48d3911-9b82-4c44-bdcc-75bd673b5aeb", + "uuid": "b1ab943c-822e-4249-996d-37735b835086", "control-id": "pcidss_4_12-9.2", "description": "The description for control-id pcidss_4_12-9.2.", "props": [ @@ -7829,7 +7812,7 @@ ] }, { - "uuid": "c0525614-3a60-40b4-abdf-45cd091de224", + "uuid": "0a1cb4de-24da-4c54-bcc2-279454df31e2", "control-id": "pcidss_4_12-10.1", "description": "The description for control-id pcidss_4_12-10.1.", "props": [ @@ -7842,7 +7825,7 @@ ] }, { - "uuid": "832fc685-9842-43e1-89fc-50931f980043", + "uuid": "2217590d-339f-4df6-8a78-dfa728f756ff", "control-id": "pcidss_4_12-10.2", "description": "The description for control-id pcidss_4_12-10.2.", "props": [ @@ -7855,7 +7838,7 @@ ] }, { - "uuid": "18e8212d-3e6d-44f8-bef8-6e59c8a53ebd", + "uuid": "eb3f3bc5-b5ee-4f79-9e7c-454dc427e5f1", "control-id": "pcidss_4_12-10.3", "description": "The description for control-id pcidss_4_12-10.3.", "props": [ @@ -7868,7 +7851,7 @@ ] }, { - "uuid": "62342fac-ab01-44cc-bef8-f481097daa70", + "uuid": "f7762368-f553-4b45-831f-b7564845bb37", "control-id": "pcidss_4_12-10.4.1", "description": "The description for control-id pcidss_4_12-10.4.1.", "props": [ @@ -7881,7 +7864,7 @@ ] }, { - "uuid": "dd42c0ed-7b87-45f7-b97d-0e30f3b17f42", + "uuid": "1c9e19d3-60f4-483d-8c7c-37ade1656b84", "control-id": "pcidss_4_12-10.5", "description": "The description for control-id pcidss_4_12-10.5.", "props": [ @@ -7894,7 +7877,7 @@ ] }, { - "uuid": "2131e4ce-0239-4cbe-a055-687a048660e8", + "uuid": "2692eaf0-2804-42fe-b676-01f9443dcb6d", "control-id": "pcidss_4_12-10.6", "description": "The description for control-id pcidss_4_12-10.6.", "props": [ @@ -7907,7 +7890,7 @@ ] }, { - "uuid": "1bdce405-de68-42c7-95c1-eb462940961c", + "uuid": "176ae688-b8bd-4d12-a5c6-7e5341e0eb5a", "control-id": "pcidss_4_12-10.7", "description": "The description for control-id pcidss_4_12-10.7.", "props": [ @@ -7920,7 +7903,7 @@ ] }, { - "uuid": "0be97fff-b629-4caf-be3d-45bfecce475f", + "uuid": "9599ca71-c06e-4906-9fe9-59ab6dfb2a80", "control-id": "a1-1.1", "description": "The description for control-id a1-1.1.", "props": [ @@ -7933,7 +7916,7 @@ ] }, { - "uuid": "e6f156fd-6d28-4468-8940-eeaf0f4e99a7", + "uuid": "77bd0b3a-be1f-4769-875f-39930d63441b", "control-id": "a1-1.2", "description": "The description for control-id a1-1.2.", "props": [ @@ -7946,7 +7929,7 @@ ] }, { - "uuid": "e3ac5f3f-e8bb-494d-9124-89f7c4634dfe", + "uuid": "17bbd553-f390-453f-b860-2548f3690f90", "control-id": "a1-1.3", "description": "The description for control-id a1-1.3.", "props": [ @@ -7959,7 +7942,7 @@ ] }, { - "uuid": "51a71042-3c7c-42dd-8aa3-efe5cbed7e2b", + "uuid": "c1f161e6-144a-48b3-91d9-eb5c1ac34cb9", "control-id": "a1-1.4", "description": "The description for control-id a1-1.4.", "props": [ @@ -7972,7 +7955,7 @@ ] }, { - "uuid": "d2af5d20-f53b-4230-b78b-eb11f4610436", + "uuid": "e77b6460-202d-485d-a894-509fcededd85", "control-id": "a1-2.1", "description": "The description for control-id a1-2.1.", "props": [ @@ -7985,7 +7968,7 @@ ] }, { - "uuid": "a2418bbd-4cf6-4150-953e-f6d198fe83ad", + "uuid": "18fcbff7-79f1-4ba5-bac3-1c4984d574d2", "control-id": "a1-2.2", "description": "The description for control-id a1-2.2.", "props": [ @@ -7998,7 +7981,7 @@ ] }, { - "uuid": "300f2b8a-e902-4f10-bf62-b759f4f35557", + "uuid": "edc8a91e-77db-4f74-a1c7-b255dd66796e", "control-id": "a1-2.3", "description": "The description for control-id a1-2.3.", "props": [ @@ -8011,7 +7994,7 @@ ] }, { - "uuid": "69be9edb-6b00-443d-883a-f056cec15b16", + "uuid": "c88dacdd-38ef-492a-a251-2e16c6bb4c77", "control-id": "a2-1.1", "description": "The description for control-id a2-1.1.", "props": [ @@ -8024,7 +8007,7 @@ ] }, { - "uuid": "003d4bd3-aee1-4da7-b43a-d44f0a2f0707", + "uuid": "427ae66a-50cf-428d-84fa-19cc5f5b8873", "control-id": "a2-1.2", "description": "The description for control-id a2-1.2.", "props": [ @@ -8037,7 +8020,7 @@ ] }, { - "uuid": "29955798-02bc-4959-ba0c-33a6c053ed7c", + "uuid": "3d6fe124-3160-4b2b-aeb4-0061ae1456a7", "control-id": "a2-1.3", "description": "The description for control-id a2-1.3.", "props": [ @@ -8050,7 +8033,7 @@ ] }, { - "uuid": "2f24a68f-b8cd-4293-8416-26bb55a89848", + "uuid": "ad446e75-57f0-469c-94ae-5f83272cc816", "control-id": "a3-1.1", "description": "The description for control-id a3-1.1.", "props": [ @@ -8063,7 +8046,7 @@ ] }, { - "uuid": "35f2641b-de9f-4c1b-842d-54e9990704c6", + "uuid": "d64b351b-6206-4d5b-ab68-83fca0e21222", "control-id": "a3-1.2", "description": "The description for control-id a3-1.2.", "props": [ @@ -8076,7 +8059,7 @@ ] }, { - "uuid": "cc3ca8a6-f910-471b-bc0b-c0b22255cbe8", + "uuid": "68206a02-3339-4553-9280-6e7409d77ae8", "control-id": "a3-1.3", "description": "The description for control-id a3-1.3.", "props": [ @@ -8089,7 +8072,7 @@ ] }, { - "uuid": "89df8bb3-6700-4ced-abf9-124dfa19c389", + "uuid": "dd81c9e8-c9f6-4df9-b3c7-f31164d229a8", "control-id": "a3-1.4", "description": "The description for control-id a3-1.4.", "props": [ @@ -8102,7 +8085,7 @@ ] }, { - "uuid": "7d400eea-8804-442a-aeae-2e0c217d0ca1", + "uuid": "70632bad-90f5-4e68-afa7-22c09b27cb54", "control-id": "a3-2.1", "description": "The description for control-id a3-2.1.", "props": [ @@ -8115,7 +8098,7 @@ ] }, { - "uuid": "92429090-f7d7-4c41-983b-91635d7c078e", + "uuid": "acac486a-7bde-4c54-805d-4e63db38e615", "control-id": "a3-2.2.1", "description": "The description for control-id a3-2.2.1.", "props": [ @@ -8128,7 +8111,7 @@ ] }, { - "uuid": "b7ff36c7-e575-4b56-b469-95ddf1257c3d", + "uuid": "d9337e89-a791-4b4b-a69d-8ba2604050ea", "control-id": "a3-2.3", "description": "The description for control-id a3-2.3.", "props": [ @@ -8141,7 +8124,7 @@ ] }, { - "uuid": "03ee2d52-7f3e-450f-87e0-4a48344069ea", + "uuid": "dd4fe732-75f7-464c-812b-7e85cd7e038a", "control-id": "a3-2.4", "description": "The description for control-id a3-2.4.", "props": [ @@ -8154,7 +8137,7 @@ ] }, { - "uuid": "1d821ce0-60e5-4c89-bce4-f5be5fc8bb71", + "uuid": "f0fbb926-82a5-41be-bc5e-1f59e4b22711", "control-id": "a3-2.5.1", "description": "The description for control-id a3-2.5.1.", "props": [ @@ -8167,7 +8150,7 @@ ] }, { - "uuid": "f27be7e6-dd29-494a-b6bc-b1cfd8db1887", + "uuid": "c72b8729-05b1-46d6-9235-3c7d8831f22e", "control-id": "a3-2.5.2", "description": "The description for control-id a3-2.5.2.", "props": [ @@ -8180,7 +8163,7 @@ ] }, { - "uuid": "26dda16e-e58c-47d2-8739-f7ffa71daa99", + "uuid": "be79f230-419c-406a-94e6-feae32180bec", "control-id": "a3-2.6.1", "description": "The description for control-id a3-2.6.1.", "props": [ @@ -8193,7 +8176,7 @@ ] }, { - "uuid": "4bdce092-a702-4593-bdfa-6e5f5d07aa6c", + "uuid": "81a50099-ef8f-42b4-9c4e-6380559fa7e9", "control-id": "a3-3.1.2", "description": "The description for control-id a3-3.1.2.", "props": [ @@ -8206,7 +8189,7 @@ ] }, { - "uuid": "d3cc2800-e02e-48a0-9aec-1d5c217410a5", + "uuid": "6537d5ad-3b1a-498c-b424-764fc0aa4528", "control-id": "a3-3.2", "description": "The description for control-id a3-3.2.", "props": [ @@ -8219,7 +8202,7 @@ ] }, { - "uuid": "cffdb2ae-e937-44e3-b6e9-dac684d26f42", + "uuid": "c4bd12bc-ac65-4c1d-b69a-add6483a841e", "control-id": "a3-3.3", "description": "The description for control-id a3-3.3.", "props": [ @@ -8232,7 +8215,7 @@ ] }, { - "uuid": "8593a8b9-9621-4ca7-a398-b29cc3624d62", + "uuid": "f3350630-1519-4791-95e7-7936596a8904", "control-id": "a3-4.1", "description": "The description for control-id a3-4.1.", "props": [ @@ -8245,7 +8228,7 @@ ] }, { - "uuid": "0a6c45d0-55c3-40b3-b9cf-0ecb7fe4c9d3", + "uuid": "07773c8e-fada-4020-a6e4-93b20ad5fc02", "control-id": "a3-5.1", "description": "The description for control-id a3-5.1.", "props": [ @@ -8576,7 +8559,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel8': 'YESCRYPT|SHA512', 'cis_rhel10': 'YESCRYPT|SHA512', 'cis_fedora': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8594,7 +8577,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel8': 'yescrypt|sha512', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8666,7 +8649,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 24: 24, 'default': 5}", + "value": "{'0': '0', 1: 1, 2: 2, 3: 3, 4: 4, 5: 5, 6: 6, 7: 7, 8: 8, 9: 9, 20: 20, 24: 24, 'default': 5}", "remarks": "rule_set_000" }, { @@ -11786,3097 +11769,3073 @@ { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", - "remarks": "rule_set_123" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", - "remarks": "rule_set_123" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", - "remarks": "rule_set_123" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_124" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_124" + "value": "Configure System Cryptography Policy", + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_124" + "value": "configure_crypto_policy", + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_124" + "value": "Configure System Cryptography Policy", + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_125" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_126" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_127" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_128" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_core_pattern", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dumps", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_core_pattern", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dumps", - "remarks": "rule_set_129" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_130" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_131" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_132" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_133" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cryptsetup-luks_installed", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install cryptsetup Package", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cryptsetup-luks_installed", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install cryptsetup Package", - "remarks": "rule_set_134" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Red Hat GPG Key Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Red Hat GPG Key Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_globally_activated", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled In Main dnf Configuration", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_globally_activated", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled In Main dnf Configuration", - "remarks": "rule_set_136" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_never_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_gpgcheck_never_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", - "remarks": "rule_set_137" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "security_patches_up_to_date", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Software Patches Installed", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "security_patches_up_to_date", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Software Patches Installed", - "remarks": "rule_set_138" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_139" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_140" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_141" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_142" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_143" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_144" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_145" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_146" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_147" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_148" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_dconf_user_profile", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure GNOME3 DConf User Profile", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_dconf_user_profile", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure GNOME3 DConf User Profile", - "remarks": "rule_set_149" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_db_up_to_date", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_db_up_to_date", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", - "remarks": "rule_set_150" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_151" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_activation_enabled", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Idle Activation", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_activation_enabled", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Idle Activation", - "remarks": "rule_set_152" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_153" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_154" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_enabled", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Lock After Idle Period", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_enabled", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Screensaver Lock After Idle Period", - "remarks": "rule_set_155" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_mode_blank", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Blank Screensaver", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_mode_blank", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Blank Screensaver", - "remarks": "rule_set_156" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_157" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_158" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_159" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gnome_gdm_disable_automatic_login", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GDM Automatic Login", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gnome_gdm_disable_automatic_login", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GDM Automatic Login", - "remarks": "rule_set_160" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_161" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_162" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_163" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_164" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_165" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_authselect", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable authselect", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_authselect", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable authselect", - "remarks": "rule_set_166" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_167" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_168" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_169" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_170" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_171" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_172" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_remember", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_remember", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse", - "remarks": "rule_set_173" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_174" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_175" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_176" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_177" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_178" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_179" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_180" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_181" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "securetty_root_login_console_only", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Virtual Console Root Logins", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "securetty_root_login_console_only", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Virtual Console Root Logins", - "remarks": "rule_set_182" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_privilege_function", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Privileged Executables Are Run", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_privilege_function", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Privileged Executables Are Run", - "remarks": "rule_set_183" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_184" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_185" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_tallylog", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - tallylog", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_tallylog", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - tallylog", - "remarks": "rule_set_186" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_187" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_188" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_189" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_190" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_191" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_192" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_193" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_194" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_195" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_196" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_197" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_198" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_199" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_200" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_201" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_202" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_203" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_204" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_205" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_206" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_208" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_209" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_210" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_211" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_212" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_213" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_214" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_215" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_216" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls", - "remarks": "rule_set_217" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_218" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_219" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_220" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_221" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_222" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_223" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_225" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_226" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_227" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_251" + "remarks": "rule_set_250" } ], "control-implementations": [ { - "uuid": "9df4dd99-1a6b-4df8-a1b6-2d93e63e32ce", + "uuid": "52bd4dac-51b3-4eea-9f87-c8c1759b501a", "source": "trestle://profiles/rhel9-pcidss_4-base/profile.json", "description": "Control implementation for pci-dss", "props": [ @@ -15076,7 +15035,7 @@ ], "implemented-requirements": [ { - "uuid": "15b75a8c-67de-46e4-af7c-a14b87369eff", + "uuid": "351ed627-9270-4ddd-8574-68b83f4fd7de", "control-id": "pcidss_4_1-1.1", "description": "The description for control-id pcidss_4_1-1.1.", "props": [ @@ -15089,7 +15048,7 @@ ] }, { - "uuid": "e95aab50-789e-459c-94eb-a72eea591b23", + "uuid": "12322404-3a5d-4247-bfc7-ae24aa6e9caf", "control-id": "pcidss_4_1-1.2", "description": "The description for control-id pcidss_4_1-1.2.", "props": [ @@ -15102,7 +15061,7 @@ ] }, { - "uuid": "f83b175b-2f19-41fb-954d-998db5a68301", + "uuid": "1900e483-5aa3-483c-8f88-1b72c775b379", "control-id": "pcidss_4_1-2.1", "description": "Examples of NSCs covered by these configuration standards include, but are not limited to,\nfirewalls, routers configured with access control lists, and cloud virtual networks. The\nobjective of this requirement is to ensure the way that NSCs are configured and operate\nare defined and consistently applied. While the tooling and standards can be automated,\nthe review of allowed accesses should be manual as different sites may have different\npolicies.", "props": [ @@ -15134,7 +15093,7 @@ ] }, { - "uuid": "598a6d8c-5304-43fe-92ac-44e2f8a1fd69", + "uuid": "e5346265-0ada-4b23-b50f-f26f12263779", "control-id": "pcidss_4_1-2.2", "description": "The description for control-id pcidss_4_1-2.2.", "props": [ @@ -15147,7 +15106,7 @@ ] }, { - "uuid": "5702430c-4537-43c3-8eb4-86ed0468f604", + "uuid": "a6b8462d-bdab-4f81-97c3-263f0d070f62", "control-id": "pcidss_4_1-2.3", "description": "The description for control-id pcidss_4_1-2.3.", "props": [ @@ -15160,7 +15119,7 @@ ] }, { - "uuid": "0582cf96-cf05-4eee-9664-587b74b7eee2", + "uuid": "555d55f7-0643-4a25-83b1-6946a9ceaed3", "control-id": "pcidss_4_1-2.4", "description": "The description for control-id pcidss_4_1-2.4.", "props": [ @@ -15173,7 +15132,7 @@ ] }, { - "uuid": "f9db58d6-4e7a-4a92-9162-4f1fc4aec409", + "uuid": "ff938b47-a712-4f03-bfc0-91bae6f303b2", "control-id": "pcidss_4_1-2.5", "description": "The description for control-id pcidss_4_1-2.5.", "props": [ @@ -15186,7 +15145,7 @@ ] }, { - "uuid": "e14af6d7-845e-4136-b7f3-d9661cbeefe8", + "uuid": "7b183152-182e-4346-bb50-c30d46f8a4de", "control-id": "pcidss_4_1-2.6", "description": "The specific risks associated with the use of insecure services, protocols, and ports are\nunderstood, assessed, and appropriately mitigated. The selected rules here basically\nremove services without encryption and restricted some common services.", "props": [ @@ -15223,7 +15182,7 @@ ] }, { - "uuid": "9c91c501-89e7-4120-a883-a6c64e45e8c4", + "uuid": "a3e3345d-2443-4082-9ecb-43a04b01a038", "control-id": "pcidss_4_1-2.7", "description": "The description for control-id pcidss_4_1-2.7.", "props": [ @@ -15236,7 +15195,7 @@ ] }, { - "uuid": "a149eb70-8c67-4d46-ab07-522600badc9e", + "uuid": "b3dd163b-e6f9-49d0-9d37-badf37d574f3", "control-id": "pcidss_4_1-2.8", "description": "No notes for control-id 1.2.8.", "props": [ @@ -15268,7 +15227,7 @@ ] }, { - "uuid": "5c8347f8-db43-46f1-90ae-0628e0e0c941", + "uuid": "5e367248-1ac9-431b-8683-1a6af65138c7", "control-id": "pcidss_4_1-3.1", "description": "No notes for control-id 1.3.1.", "props": [ @@ -15290,7 +15249,7 @@ ] }, { - "uuid": "b54e4243-31a5-4576-bc27-65d84b7d1aa4", + "uuid": "e172aa3d-889f-43c2-a3a0-23bca4d7f11a", "control-id": "pcidss_4_1-3.2", "description": "The description for control-id pcidss_4_1-3.2.", "props": [ @@ -15303,7 +15262,7 @@ ] }, { - "uuid": "2ec50307-c672-48b6-ba1c-2871dfc294f1", + "uuid": "8cc5e235-f2d2-4163-9dd2-fc4ff01dd92a", "control-id": "pcidss_4_1-3.3", "description": "Wireless interfaces are not expected in servers so they are disabled by default in this\npolicy.", "props": [ @@ -15320,7 +15279,7 @@ ] }, { - "uuid": "f91712c0-5223-4cb9-8f11-a49022e9f09e", + "uuid": "6b22de2a-f34b-4c58-b194-a3fd56c3b3fa", "control-id": "pcidss_4_1-4.1", "description": "Trusted and untrusted networks are expected to be different for each environment.\nBut loopback traffic is assumed to be trusted and even necessary for some services.\nThis requirement is complements 1.2.1 and 1.3.1 requirements.", "props": [ @@ -15347,7 +15306,7 @@ ] }, { - "uuid": "ff0043b2-aee6-4cd8-9b1f-7c0ff4fc9bbf", + "uuid": "8c0e0740-d22e-41d7-9bb2-c3ef5a7a4fd8", "control-id": "pcidss_4_1-4.2", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -15389,7 +15348,7 @@ ] }, { - "uuid": "5367fe12-d0b1-45c1-9ae8-9dedae082852", + "uuid": "ce605577-44f8-432d-a745-e755aaacc174", "control-id": "pcidss_4_1-4.3", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -15426,7 +15385,7 @@ ] }, { - "uuid": "202eff8a-81ae-44cf-9bb5-7ef9029cdceb", + "uuid": "82f5b709-0a57-47d1-bd1c-6bc064cdd367", "control-id": "pcidss_4_1-4.4", "description": "The description for control-id pcidss_4_1-4.4.", "props": [ @@ -15439,7 +15398,7 @@ ] }, { - "uuid": "335338f6-f263-43ed-83d5-6278d86ed4d7", + "uuid": "dbe1a4fd-14e0-4e03-878e-c4ffca22fae4", "control-id": "pcidss_4_1-4.5", "description": "No notes for control-id 1.4.5.", "props": [ @@ -15466,7 +15425,7 @@ ] }, { - "uuid": "8246085a-7fd0-4373-b1ae-b6e8f366f730", + "uuid": "eadf47f9-8add-4270-96fe-4f86e89f6630", "control-id": "pcidss_4_1-5.1", "description": "To ensure this requirement, a manual analysis of site policy and topology is inevitable.\nFrom the technical perspective, previous requirements should already cover this\nrequirement at some level.", "props": [ @@ -15478,7 +15437,7 @@ ] }, { - "uuid": "dc268629-44f2-470b-b2ff-08867cc73bfe", + "uuid": "677501db-751f-4510-9c27-39caf19804da", "control-id": "pcidss_4_2-1.1", "description": "The description for control-id pcidss_4_2-1.1.", "props": [ @@ -15491,7 +15450,7 @@ ] }, { - "uuid": "8b2b6a86-ead5-4b6a-bfae-11992fb15791", + "uuid": "3d280060-cb8b-46d3-847d-389abe47e226", "control-id": "pcidss_4_2-1.2", "description": "The description for control-id pcidss_4_2-1.2.", "props": [ @@ -15504,7 +15463,7 @@ ] }, { - "uuid": "8d155939-2294-4369-bf06-3c237fb8ea76", + "uuid": "7c41ec3e-ffa4-4662-8d9c-36faad9fbdd6", "control-id": "pcidss_4_2-2.1", "description": "Interestingly this requirement recommends other standards, such as Center for Internet\nSecurity (CIS), International Organization for Standardization (ISO), National Institute\nof Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the\nrules included here are very generic in terms of hardening.", "props": [ @@ -15521,7 +15480,7 @@ ] }, { - "uuid": "52e7e2ee-1a9a-4151-ab4b-1de3a7b53079", + "uuid": "18a1f4a0-03b6-428b-897a-e4f6b60b4ec8", "control-id": "pcidss_4_2-2.2", "description": "Also related to requirement 8.2.6 and 8.3.5.", "props": [ @@ -15543,7 +15502,7 @@ ] }, { - "uuid": "e03fc53f-1ada-4eca-833a-8ba28cfe32ae", + "uuid": "85814073-5ea1-410a-aff1-c4c72428e029", "control-id": "pcidss_4_2-2.3", "description": "The description for control-id pcidss_4_2-2.3.", "props": [ @@ -15556,7 +15515,7 @@ ] }, { - "uuid": "3ad01cec-b4b7-4a6e-a828-59994c12ad4c", + "uuid": "cfd9826b-47a6-4a09-b317-03f65790e998", "control-id": "pcidss_4_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -15618,7 +15577,7 @@ ] }, { - "uuid": "aca2962a-947f-4d77-b31a-257ceb427950", + "uuid": "d1dc85f7-2dc7-4d5e-9546-a5f47cee85b2", "control-id": "pcidss_4_2-2.5", "description": "The description for control-id pcidss_4_2-2.5.", "props": [ @@ -15631,7 +15590,7 @@ ] }, { - "uuid": "7b4947d6-d5e0-4b0a-a4f9-d471f0ebf6aa", + "uuid": "df4cd7e5-4322-40b9-9249-603ed19e1298", "control-id": "pcidss_4_2-2.6", "description": "This requirement is not specific but also points to 2.2.1, where other policies are\nreferenced. Therefore, the most common rules related to system configuration in order to\nprevent misuse and selected in main profiles are also selected here.", "props": [ @@ -16028,7 +15987,7 @@ ] }, { - "uuid": "3c54658b-fff4-44d2-9091-23b3b4124c65", + "uuid": "547a6ec8-d3a2-495d-aba5-842bf926a4c8", "control-id": "pcidss_4_2-2.7", "description": "Related to requirement 12.3.3.", "props": [ @@ -16041,16 +16000,11 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy" } ] }, { - "uuid": "7dd94ace-b888-4b99-b5bd-e8d0983b77bf", + "uuid": "24fa1b26-fd5d-40f5-bf1f-bf6cd0390fdb", "control-id": "pcidss_4_2-3.1", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -16062,7 +16016,7 @@ ] }, { - "uuid": "11fa3f3e-c8e1-478c-a0a3-2db13d6767dc", + "uuid": "bd7fe2c8-72a4-4034-8ac5-2a246b271dab", "control-id": "pcidss_4_2-3.2", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -16074,7 +16028,7 @@ ] }, { - "uuid": "c20cfa80-3436-49a7-86b2-5b5816b81d6e", + "uuid": "6156c5a7-fd97-47fe-9eb8-16e3c28c35df", "control-id": "pcidss_4_3-1.1", "description": "The description for control-id pcidss_4_3-1.1.", "props": [ @@ -16087,7 +16041,7 @@ ] }, { - "uuid": "e460c96c-4951-4c94-961f-45caf018e95c", + "uuid": "50a39528-f096-4673-ba7f-695f9e432fcf", "control-id": "pcidss_4_3-1.2", "description": "The description for control-id pcidss_4_3-1.2.", "props": [ @@ -16100,7 +16054,7 @@ ] }, { - "uuid": "4beea53e-e56e-49a8-bbbe-0a0661f57140", + "uuid": "d93c6d1e-20d8-440e-a0be-65a26a0f962c", "control-id": "pcidss_4_3-2.1", "description": "The description for control-id pcidss_4_3-2.1.", "props": [ @@ -16113,7 +16067,7 @@ ] }, { - "uuid": "1a3b8245-957c-4a42-b583-ccc7e5ef4206", + "uuid": "8081d493-d2e7-4eba-8a17-293963d8eac9", "control-id": "pcidss_4_3-3.1.1", "description": "This requirement consists in auditing files, databases and memory to make sure the full\ncontent of any track is not unnecessarily stored. It involves manual auditing but some\nautomated rules fit this requirement in order to reduce the chances if this data be\nunintentionally stored in memory.", "props": [ @@ -16155,7 +16109,7 @@ ] }, { - "uuid": "050e9438-3fcd-474c-8404-bd9ce9c2af68", + "uuid": "2ba6cb9a-54f5-4eaa-97a9-befbaac1f07c", "control-id": "pcidss_4_3-3.1.2", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -16167,7 +16121,7 @@ ] }, { - "uuid": "9f86b268-58fd-4316-a44f-ec8470af703b", + "uuid": "fc1d3af4-3f49-437f-aca7-82b6640c85f8", "control-id": "pcidss_4_3-3.1.3", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -16179,7 +16133,7 @@ ] }, { - "uuid": "0db6fc16-564a-4e1b-888e-3a6cf65927ae", + "uuid": "0feb2ccb-9a74-4386-97d4-85b8e599eedb", "control-id": "pcidss_4_3-3.2", "description": "The description for control-id pcidss_4_3-3.2.", "props": [ @@ -16192,7 +16146,7 @@ ] }, { - "uuid": "5374988c-e43a-4834-a418-ca4bf1efebff", + "uuid": "8ef028a9-d939-4cf8-a4a5-dbd92e837c0b", "control-id": "pcidss_4_3-3.3", "description": "The description for control-id pcidss_4_3-3.3.", "props": [ @@ -16205,7 +16159,7 @@ ] }, { - "uuid": "4e5d0024-e457-48e9-b825-9acff912dc9b", + "uuid": "a041dbfe-5721-4af8-babb-6e4fae491d4c", "control-id": "pcidss_4_3-4.1", "description": "The description for control-id pcidss_4_3-4.1.", "props": [ @@ -16218,7 +16172,7 @@ ] }, { - "uuid": "1bd7fa15-23a3-4167-a2ad-21da1e5493ad", + "uuid": "fe6d5a98-1cb5-43a5-b5a2-6017a9749c88", "control-id": "pcidss_4_3-4.2", "description": "There are technical rules to disable removable storage devices. However, this requirement\nstill demand some manual auditing in documentation and eventual exceptions.", "props": [ @@ -16245,7 +16199,7 @@ ] }, { - "uuid": "6efe10d8-4648-4870-80bd-4290faeb91a1", + "uuid": "644ad7bd-3f3a-44c4-bd3b-cf7e7fcfcb13", "control-id": "pcidss_4_3-5.1.1", "description": "The description for control-id pcidss_4_3-5.1.1.", "props": [ @@ -16258,7 +16212,7 @@ ] }, { - "uuid": "ba12f2f0-9858-42a1-b913-1d4ad689fee9", + "uuid": "669edbd4-cf93-47a6-b625-0ace5e4ca170", "control-id": "pcidss_4_3-5.1.2", "description": "No notes for control-id 3.5.1.2.", "props": [ @@ -16275,7 +16229,7 @@ ] }, { - "uuid": "32fc53f4-72f6-41ef-adbb-f61c1d237ba6", + "uuid": "21160451-c613-4634-a77e-80b5e3825835", "control-id": "pcidss_4_3-5.1.3", "description": "The description for control-id pcidss_4_3-5.1.3.", "props": [ @@ -16288,7 +16242,7 @@ ] }, { - "uuid": "217f44be-0416-440e-a306-0f7e74e1bef5", + "uuid": "5c340c49-f1ab-4160-b33e-516c41e35087", "control-id": "pcidss_4_3-6.1.1", "description": "The description for control-id pcidss_4_3-6.1.1.", "props": [ @@ -16301,7 +16255,7 @@ ] }, { - "uuid": "b90d0ef1-b343-4aa3-bc04-cb85df589830", + "uuid": "f6226c21-8b09-4189-8071-3a8886b4169e", "control-id": "pcidss_4_3-6.1.2", "description": "The description for control-id pcidss_4_3-6.1.2.", "props": [ @@ -16314,7 +16268,7 @@ ] }, { - "uuid": "c072a99a-e4d0-4e08-951c-215a2af4cbb6", + "uuid": "d13560da-8b91-4828-aaa0-1823ca52cf4a", "control-id": "pcidss_4_3-6.1.3", "description": "The description for control-id pcidss_4_3-6.1.3.", "props": [ @@ -16327,7 +16281,7 @@ ] }, { - "uuid": "3469bb2a-f4c4-4885-9d64-b65b8f4e394a", + "uuid": "5a99af9a-3722-4aa4-9a90-29fb6669d7c2", "control-id": "pcidss_4_3-6.1.4", "description": "The description for control-id pcidss_4_3-6.1.4.", "props": [ @@ -16340,7 +16294,7 @@ ] }, { - "uuid": "cd7a2d5a-6b1f-4cec-82c7-c2fc6fa62c6c", + "uuid": "fdd309bb-7cb7-4df9-b74c-1d8ed2ef4946", "control-id": "pcidss_4_3-7.1", "description": "The description for control-id pcidss_4_3-7.1.", "props": [ @@ -16353,7 +16307,7 @@ ] }, { - "uuid": "8a317e78-c3c8-4d9e-a11c-b4451986a21d", + "uuid": "92ee1470-e1b3-4c5a-bd2f-7c17f1a3f57a", "control-id": "pcidss_4_3-7.2", "description": "The description for control-id pcidss_4_3-7.2.", "props": [ @@ -16366,7 +16320,7 @@ ] }, { - "uuid": "ef64049f-ede5-4b0c-891c-07a0404823fb", + "uuid": "11656011-fed5-442e-8b9e-625f1f58972f", "control-id": "pcidss_4_3-7.3", "description": "The description for control-id pcidss_4_3-7.3.", "props": [ @@ -16379,7 +16333,7 @@ ] }, { - "uuid": "aebe2206-0d84-47de-9d63-3d77c26dc310", + "uuid": "4b0bfc30-eae5-4a7c-a6f4-42163694cc46", "control-id": "pcidss_4_3-7.4", "description": "The description for control-id pcidss_4_3-7.4.", "props": [ @@ -16392,7 +16346,7 @@ ] }, { - "uuid": "3367126a-b889-431f-a7cb-785f7377c5c6", + "uuid": "a3b8425e-5260-4443-afea-231edacbb3cc", "control-id": "pcidss_4_3-7.5", "description": "The description for control-id pcidss_4_3-7.5.", "props": [ @@ -16405,7 +16359,7 @@ ] }, { - "uuid": "9e56a704-a47a-4ad0-bd1d-ceff4559e058", + "uuid": "91f1ce8e-822f-47b4-94cd-5af58d451d44", "control-id": "pcidss_4_3-7.6", "description": "The description for control-id pcidss_4_3-7.6.", "props": [ @@ -16418,7 +16372,7 @@ ] }, { - "uuid": "0f0c6e0d-eb80-4900-bf78-531ce633e391", + "uuid": "f50fa4e8-35c6-45a9-ae17-09d93d86994e", "control-id": "pcidss_4_3-7.7", "description": "The description for control-id pcidss_4_3-7.7.", "props": [ @@ -16431,7 +16385,7 @@ ] }, { - "uuid": "8a5420e2-e01f-498e-ad68-ef1143ca5205", + "uuid": "3241d344-be6e-4dfb-8ded-19f18fec92bc", "control-id": "pcidss_4_3-7.8", "description": "The description for control-id pcidss_4_3-7.8.", "props": [ @@ -16444,7 +16398,7 @@ ] }, { - "uuid": "3145b194-c286-40b7-ad76-e87889a173f0", + "uuid": "28033acf-ae62-4069-889e-200201b02a23", "control-id": "pcidss_4_3-7.9", "description": "The description for control-id pcidss_4_3-7.9.", "props": [ @@ -16457,7 +16411,7 @@ ] }, { - "uuid": "f197dcba-6270-4ebc-89c0-3e799ec200ee", + "uuid": "aa2c3956-5534-4a4f-9c4a-fd9459f53714", "control-id": "pcidss_4_4-1.1", "description": "The description for control-id pcidss_4_4-1.1.", "props": [ @@ -16470,7 +16424,7 @@ ] }, { - "uuid": "76b927d9-41f3-4d29-af5d-ad6e09fbe30d", + "uuid": "2ab2212f-718b-4fb7-a137-69a723c0ff58", "control-id": "pcidss_4_4-1.2", "description": "The description for control-id pcidss_4_4-1.2.", "props": [ @@ -16483,7 +16437,7 @@ ] }, { - "uuid": "fbe672e5-ed1b-431d-86f4-27e7e60c1b24", + "uuid": "7eba47cd-b616-4522-aaa7-4410b35fd0e9", "control-id": "pcidss_4_4-2.1.1", "description": "The description for control-id pcidss_4_4-2.1.1.", "props": [ @@ -16496,7 +16450,7 @@ ] }, { - "uuid": "811b7c87-1def-4985-8a37-fb1900521077", + "uuid": "5c0e0b2b-fa98-41af-96cb-676783029302", "control-id": "pcidss_4_4-2.1.2", "description": "The description for control-id pcidss_4_4-2.1.2.", "props": [ @@ -16509,7 +16463,7 @@ ] }, { - "uuid": "e6803680-4c3d-4080-8145-17598f80c2a1", + "uuid": "72f93caa-9631-42bb-8cd9-ac49f5a6f466", "control-id": "pcidss_4_4-2.2", "description": "The description for control-id pcidss_4_4-2.2.", "props": [ @@ -16522,7 +16476,7 @@ ] }, { - "uuid": "c683ec60-9793-4faf-9a8f-38ce8bc10514", + "uuid": "fe782756-0a1e-4887-ac63-94a5071701e7", "control-id": "pcidss_4_5-1.1", "description": "The description for control-id pcidss_4_5-1.1.", "props": [ @@ -16535,7 +16489,7 @@ ] }, { - "uuid": "df1ffc03-6220-404b-8b6a-ecae6e9f24b4", + "uuid": "17e99f62-ca48-44fd-812f-8eabbf4044a0", "control-id": "pcidss_4_5-1.2", "description": "The description for control-id pcidss_4_5-1.2.", "props": [ @@ -16548,7 +16502,7 @@ ] }, { - "uuid": "736a7eec-85c0-49e8-8047-f787709a9787", + "uuid": "e69340d0-cb2b-4617-9d39-d3f1ae9a2ac9", "control-id": "pcidss_4_5-2.1", "description": "There are many options of anti-malware and the criteria for any adopted solution or\napproach relies on each site policy. Technologies are supported but manual assessment is\nrequired.", "props": [ @@ -16560,7 +16514,7 @@ ] }, { - "uuid": "bbf7cccc-2753-46b8-ac11-0590e9e4f6b6", + "uuid": "912ff535-7cbb-49f8-b389-c5cb363242d3", "control-id": "pcidss_4_5-2.2", "description": "The description for control-id pcidss_4_5-2.2.", "props": [ @@ -16573,7 +16527,7 @@ ] }, { - "uuid": "47e568b1-3b36-49b9-b838-20a850dfc108", + "uuid": "b73968c8-b535-4866-b6a3-231fd5adf5d7", "control-id": "pcidss_4_5-2.3.1", "description": "The description for control-id pcidss_4_5-2.3.1.", "props": [ @@ -16586,7 +16540,7 @@ ] }, { - "uuid": "a4392d36-f421-49dc-bf28-0da71e92940a", + "uuid": "5a5fd9c2-768a-4d0d-a744-ed8ab4de5f9f", "control-id": "pcidss_4_5-3.1", "description": "The description for control-id pcidss_4_5-3.1.", "props": [ @@ -16599,7 +16553,7 @@ ] }, { - "uuid": "8d8a7d1f-ce52-48ee-94b5-5f7b7349e32c", + "uuid": "b9017de3-cd3b-48a5-ad87-cefb2aa941f4", "control-id": "pcidss_4_5-3.2.1", "description": "The description for control-id pcidss_4_5-3.2.1.", "props": [ @@ -16612,7 +16566,7 @@ ] }, { - "uuid": "87ccda06-636b-4f91-b768-774a4d48176d", + "uuid": "0bf1babc-bbbf-4416-ae0b-dd76bdc97b3f", "control-id": "pcidss_4_5-3.3", "description": "The description for control-id pcidss_4_5-3.3.", "props": [ @@ -16625,7 +16579,7 @@ ] }, { - "uuid": "7edd9cb3-f986-4915-970e-3494b9c16fc6", + "uuid": "066769ef-3905-47f0-ae2e-06c157573068", "control-id": "pcidss_4_5-3.4", "description": "The description for control-id pcidss_4_5-3.4.", "props": [ @@ -16638,7 +16592,7 @@ ] }, { - "uuid": "82a40574-09ac-46e1-abd6-0849be2feae7", + "uuid": "9f24675b-4c78-4090-8cd5-a3fe98049592", "control-id": "pcidss_4_5-3.5", "description": "The description for control-id pcidss_4_5-3.5.", "props": [ @@ -16651,7 +16605,7 @@ ] }, { - "uuid": "6037f30f-e12f-4167-98d1-7091383c8133", + "uuid": "401d8fd2-072f-4089-b3da-9e84a2203faf", "control-id": "pcidss_4_5-4.1", "description": "The description for control-id pcidss_4_5-4.1.", "props": [ @@ -16664,7 +16618,7 @@ ] }, { - "uuid": "99980a1a-a03e-4389-870d-7dedd6cad87b", + "uuid": "5b43930d-6c44-476a-8074-53752a2f1740", "control-id": "pcidss_4_6-1.1", "description": "The description for control-id pcidss_4_6-1.1.", "props": [ @@ -16677,7 +16631,7 @@ ] }, { - "uuid": "2b8d9a3f-618a-4917-ab29-a90993ef0252", + "uuid": "f0bf7f71-d585-4d29-aad5-5ed352ab9072", "control-id": "pcidss_4_6-1.2", "description": "The description for control-id pcidss_4_6-1.2.", "props": [ @@ -16690,7 +16644,7 @@ ] }, { - "uuid": "5ac098aa-75b9-44a6-b2a8-17d8ea7240e4", + "uuid": "cf62fee1-8f18-4e5c-9080-38e4a8ff343c", "control-id": "pcidss_4_6-2.1", "description": "The description for control-id pcidss_4_6-2.1.", "props": [ @@ -16703,7 +16657,7 @@ ] }, { - "uuid": "36f17119-9e7b-42e1-953b-a0c96dd0c4a3", + "uuid": "b5e0fb8f-4945-40fc-9740-efc22667331d", "control-id": "pcidss_4_6-2.2", "description": "The description for control-id pcidss_4_6-2.2.", "props": [ @@ -16716,7 +16670,7 @@ ] }, { - "uuid": "05328357-341e-46df-8446-e71c07329403", + "uuid": "ba4a7f04-b726-43e3-9d04-5d6d4be73665", "control-id": "pcidss_4_6-2.3.1", "description": "The description for control-id pcidss_4_6-2.3.1.", "props": [ @@ -16729,7 +16683,7 @@ ] }, { - "uuid": "ad857e8c-e7cf-42d6-807e-fcd2e2fcf9d5", + "uuid": "0d39bc1e-0b6f-4eb8-bbd1-502695b31267", "control-id": "pcidss_4_6-2.4", "description": "The description for control-id pcidss_4_6-2.4.", "props": [ @@ -16742,7 +16696,7 @@ ] }, { - "uuid": "4465cdaa-ecbe-4999-83f7-06a97f7e4407", + "uuid": "f7981f83-26a5-4051-aa17-b36e63cccef7", "control-id": "pcidss_4_6-3.1", "description": "The description for control-id pcidss_4_6-3.1.", "props": [ @@ -16755,7 +16709,7 @@ ] }, { - "uuid": "c8be09ee-6671-4dcf-90bf-2f3816a1825c", + "uuid": "382b5e8e-075f-4bda-a78a-ca10a5ab03d1", "control-id": "pcidss_4_6-3.2", "description": "The description for control-id pcidss_4_6-3.2.", "props": [ @@ -16768,7 +16722,7 @@ ] }, { - "uuid": "e5f18217-8dcf-4505-9306-34161d761b7c", + "uuid": "5cd72d96-ac11-4479-a03f-933ce15583d9", "control-id": "pcidss_4_6-3.3", "description": "No notes for control-id 6.3.3.", "props": [ @@ -16800,7 +16754,7 @@ ] }, { - "uuid": "550997f7-4aec-48da-8dfa-9362df2ea8fb", + "uuid": "b34dda95-a29c-4f67-8092-154e1934f14f", "control-id": "pcidss_4_6-4.1", "description": "The description for control-id pcidss_4_6-4.1.", "props": [ @@ -16813,7 +16767,7 @@ ] }, { - "uuid": "c89a0672-d283-4641-8180-6dfa1588c88f", + "uuid": "d0390e59-fb5c-416a-aa09-34ef8f6e629f", "control-id": "pcidss_4_6-4.2", "description": "The description for control-id pcidss_4_6-4.2.", "props": [ @@ -16826,7 +16780,7 @@ ] }, { - "uuid": "1a8ef243-ec26-432e-a675-c49683c157c4", + "uuid": "8e2f0440-743f-48b5-8dad-aad07dd1e8fd", "control-id": "pcidss_4_6-4.3", "description": "The description for control-id pcidss_4_6-4.3.", "props": [ @@ -16839,7 +16793,7 @@ ] }, { - "uuid": "359d162c-39af-4c9b-9c47-8820c689cf73", + "uuid": "f246cf52-667b-4498-9ab8-dccecbf3cc3f", "control-id": "pcidss_4_6-5.1", "description": "The description for control-id pcidss_4_6-5.1.", "props": [ @@ -16852,7 +16806,7 @@ ] }, { - "uuid": "71928cfe-1e71-406e-915f-578f89c3c5e5", + "uuid": "54628366-64d0-453b-9eae-188bae1460eb", "control-id": "pcidss_4_6-5.2", "description": "The description for control-id pcidss_4_6-5.2.", "props": [ @@ -16865,7 +16819,7 @@ ] }, { - "uuid": "1eb87c34-1fa6-4837-9ae9-eb87be3c99f9", + "uuid": "77a93e8c-a141-4536-88cc-2b9bd7866ef4", "control-id": "pcidss_4_6-5.3", "description": "The description for control-id pcidss_4_6-5.3.", "props": [ @@ -16878,7 +16832,7 @@ ] }, { - "uuid": "2cd01299-61b1-49e4-aaa3-5755a3d20a89", + "uuid": "ee1d90d9-01a8-45e3-8e3e-f6dcd0d97147", "control-id": "pcidss_4_6-5.4", "description": "The description for control-id pcidss_4_6-5.4.", "props": [ @@ -16891,7 +16845,7 @@ ] }, { - "uuid": "899fefb5-bbf0-433d-9add-c1673363dda3", + "uuid": "02592058-5453-451d-87c5-292b770fa718", "control-id": "pcidss_4_6-5.5", "description": "The description for control-id pcidss_4_6-5.5.", "props": [ @@ -16904,7 +16858,7 @@ ] }, { - "uuid": "f1e332b0-c4e8-494c-a0a6-562c15d3592f", + "uuid": "4d2f1522-37c6-4844-a642-f069f5716d71", "control-id": "pcidss_4_6-5.6", "description": "The description for control-id pcidss_4_6-5.6.", "props": [ @@ -16917,7 +16871,7 @@ ] }, { - "uuid": "7c2351a5-5142-42ef-bedc-6c57cbf607bf", + "uuid": "893d0c0f-3ee7-4eaa-b516-2a6972612a20", "control-id": "pcidss_4_7-1.1", "description": "The description for control-id pcidss_4_7-1.1.", "props": [ @@ -16930,7 +16884,7 @@ ] }, { - "uuid": "933a6039-ad01-4af8-91c3-a37bde30d4cc", + "uuid": "8f3e9a19-e3b1-48b2-b42a-75543cfa186d", "control-id": "pcidss_4_7-1.2", "description": "The description for control-id pcidss_4_7-1.2.", "props": [ @@ -16943,7 +16897,7 @@ ] }, { - "uuid": "a0bc7533-da21-4689-9fdc-dadbaab0c356", + "uuid": "55aa292a-ea97-44a2-9d25-5268af524b36", "control-id": "pcidss_4_7-2.1", "description": "The description for control-id pcidss_4_7-2.1.", "props": [ @@ -16956,7 +16910,7 @@ ] }, { - "uuid": "9659fbae-c8f0-41b9-952a-f043150aa88f", + "uuid": "e85a8629-7894-4147-ba01-bc7d22b1e987", "control-id": "pcidss_4_7-2.2", "description": "The description for control-id pcidss_4_7-2.2.", "props": [ @@ -16969,7 +16923,7 @@ ] }, { - "uuid": "e7f5c3c3-12dc-421a-a78a-a3af2a4c3ba8", + "uuid": "0d5e9e07-37bb-4dc7-bd0e-40cdfee9c365", "control-id": "pcidss_4_7-2.3", "description": "The description for control-id pcidss_4_7-2.3.", "props": [ @@ -16982,7 +16936,7 @@ ] }, { - "uuid": "0325b3bb-4d30-4c8b-98a2-3b06cfb75584", + "uuid": "f635c32f-095d-4239-97c8-f2a8a0894761", "control-id": "pcidss_4_7-2.4", "description": "The description for control-id pcidss_4_7-2.4.", "props": [ @@ -16995,7 +16949,7 @@ ] }, { - "uuid": "ec9659ab-b44a-4018-9a76-29e7a1b52f4f", + "uuid": "10ebff02-a2c1-4304-a940-5bf6c5001b29", "control-id": "pcidss_4_7-2.5.1", "description": "The description for control-id pcidss_4_7-2.5.1.", "props": [ @@ -17008,7 +16962,7 @@ ] }, { - "uuid": "abd680f0-3139-4a60-8eda-844fb76ff4e7", + "uuid": "54328ae1-543f-4a9c-8054-9c483be86e1c", "control-id": "pcidss_4_7-2.6", "description": "The description for control-id pcidss_4_7-2.6.", "props": [ @@ -17021,7 +16975,7 @@ ] }, { - "uuid": "14372e05-2c63-408d-975c-56277068f75b", + "uuid": "2926440c-82da-4081-a6a3-cbd8e87098f7", "control-id": "pcidss_4_7-3.1", "description": "The description for control-id pcidss_4_7-3.1.", "props": [ @@ -17034,7 +16988,7 @@ ] }, { - "uuid": "7b9bb0fd-380d-4ca3-8444-bd5a87d4dc91", + "uuid": "65e70a90-a41d-4d6c-aa78-f14e6e79850b", "control-id": "pcidss_4_7-3.2", "description": "The description for control-id pcidss_4_7-3.2.", "props": [ @@ -17047,7 +17001,7 @@ ] }, { - "uuid": "ef2b0aff-f58f-4680-b85d-988aab60a5ac", + "uuid": "36a75a96-0ed0-4eca-8853-1d7eb22c378d", "control-id": "pcidss_4_7-3.3", "description": "The description for control-id pcidss_4_7-3.3.", "props": [ @@ -17060,7 +17014,7 @@ ] }, { - "uuid": "d851054e-9f69-481d-bb64-c7299d993ea7", + "uuid": "59316cd4-1fe0-40f2-bf9a-b37311182dfc", "control-id": "pcidss_4_8-1.1", "description": "The description for control-id pcidss_4_8-1.1.", "props": [ @@ -17073,7 +17027,7 @@ ] }, { - "uuid": "1a9f8944-aea8-4c4a-8d2f-5e303e265460", + "uuid": "a8143a60-8c1b-4c96-8028-ddf698a261a7", "control-id": "pcidss_4_8-1.2", "description": "The description for control-id pcidss_4_8-1.2.", "props": [ @@ -17086,7 +17040,7 @@ ] }, { - "uuid": "0b06643a-e9ea-4e7a-a53c-d35acbd5aee0", + "uuid": "3700acc0-ed00-428f-96df-601bb0208173", "control-id": "pcidss_4_8-2.1", "description": "The description for control-id pcidss_4_8-2.1.", "props": [ @@ -17124,7 +17078,7 @@ ] }, { - "uuid": "57c76669-b744-4f34-a62f-6d8bc046f112", + "uuid": "67817a46-1602-4f0f-a24e-cae14b907c79", "control-id": "pcidss_4_8-2.2", "description": "This requirement is complemented by 8.2.1 and related to 8.3.5.", "props": [ @@ -17151,7 +17105,7 @@ ] }, { - "uuid": "eb79f0df-d50f-4e0f-bae1-907cf3702099", + "uuid": "36813376-9515-445b-b4af-cf98a5d8488f", "control-id": "pcidss_4_8-2.3", "description": "The description for control-id pcidss_4_8-2.3.", "props": [ @@ -17164,7 +17118,7 @@ ] }, { - "uuid": "a1715793-1d7f-4d7f-9126-07a9f82e6698", + "uuid": "7f3bf5d1-3f09-4a16-9bfe-472ef802fd4d", "control-id": "pcidss_4_8-2.4", "description": "The description for control-id pcidss_4_8-2.4.", "props": [ @@ -17177,7 +17131,7 @@ ] }, { - "uuid": "291a0554-e701-48e4-824d-71b6e302cf32", + "uuid": "8c5035f8-48b5-4fc4-8c28-a14435ad597e", "control-id": "pcidss_4_8-2.5", "description": "The description for control-id pcidss_4_8-2.5.", "props": [ @@ -17190,7 +17144,7 @@ ] }, { - "uuid": "59217a4e-dda8-478b-bd96-33db11e31b3a", + "uuid": "c63c0a23-0c7b-4658-8b9d-467eace76043", "control-id": "pcidss_4_8-2.6", "description": "Also related to requirements 2.2.2 and 8.3.5.", "props": [ @@ -17212,7 +17166,7 @@ ] }, { - "uuid": "fd285496-02ba-499e-a1db-442ed4ce6a29", + "uuid": "95bf0ee0-f8e9-4de9-8178-38d45e726d95", "control-id": "pcidss_4_8-2.7", "description": "The description for control-id pcidss_4_8-2.7.", "props": [ @@ -17225,7 +17179,7 @@ ] }, { - "uuid": "fb12a64c-9977-4d5f-9ce8-b80c51c6a67f", + "uuid": "f13998e0-0137-49d0-9141-e6584b9e5917", "control-id": "pcidss_4_8-2.8", "description": "No notes for control-id 8.2.8.", "props": [ @@ -17287,7 +17241,7 @@ ] }, { - "uuid": "a0e1aad2-d1f8-4f6d-a03c-34a925986f46", + "uuid": "15990808-c5a4-48ea-b8f8-1404b7abc8e5", "control-id": "pcidss_4_8-3.1", "description": "No notes for control-id 8.3.1.", "props": [ @@ -17314,7 +17268,7 @@ ] }, { - "uuid": "d4d37b43-99ad-4f73-b7fe-efac67b5f030", + "uuid": "ffec32b1-e618-4b9f-971e-8135fdcf4ec6", "control-id": "pcidss_4_8-3.2", "description": "There are similar rules that might be redundant for some distros.", "props": [ @@ -17346,7 +17300,7 @@ ] }, { - "uuid": "9c2c5b28-88e0-461c-acfe-f14236661768", + "uuid": "95c1dc34-fd36-4cf1-b57b-9b7ef4757632", "control-id": "pcidss_4_8-3.3", "description": "The description for control-id pcidss_4_8-3.3.", "props": [ @@ -17359,7 +17313,7 @@ ] }, { - "uuid": "b2610432-2c12-47a3-95b8-aa09b59b7dba", + "uuid": "c41f2f36-891c-4b16-a02c-81fffe90bd04", "control-id": "pcidss_4_8-3.4", "description": "No notes for control-id 8.3.4.", "props": [ @@ -17386,7 +17340,7 @@ ] }, { - "uuid": "88db3b72-4d33-4370-9aa4-497fc2439a9b", + "uuid": "9fcce3aa-b9f4-4cc0-a6c4-983f2df0970f", "control-id": "pcidss_4_8-3.5", "description": "Also related to requirement 2.2.2, 8.2.2 and 8.2.6.", "props": [ @@ -17403,7 +17357,7 @@ ] }, { - "uuid": "a30392e1-6e96-4fe2-a72f-37b93e615b5f", + "uuid": "08f38036-7131-44d3-8c7e-248cc1707244", "control-id": "pcidss_4_8-3.6", "description": "This requirement is not intended to apply to:\n- User accounts on point-of-sale terminals that have access to only one card number at a\ntime to facilitate a single transaction (such as IDs used by cashiers on point-of-sale\nterminals).\n- Application or system accounts, which are governed by requirements in section 8.6.", "props": [ @@ -17430,7 +17384,7 @@ ] }, { - "uuid": "0572693a-d031-4cd8-94c7-13e4c3945006", + "uuid": "451d05ff-1976-40e6-97b4-14fe1fda1f06", "control-id": "pcidss_4_8-3.7", "description": "This requirement is not intended to apply to user accounts on point-of-sale terminals that\nhave access to only one card number at a time to facilitate a single transaction (such as\nIDs used by cashiers on point-of-sale terminals).\nFor RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be\nprefered in detriment of accounts_password_pam_unix_remember. Using both should not create\nconflict but is unnecessary and the last should be filtered out from the profile.", "props": [ @@ -17457,7 +17411,7 @@ ] }, { - "uuid": "3c6d0e4d-44c7-44eb-82d5-5ed782fc5db4", + "uuid": "551c95f7-66e2-4af3-ab26-eb2629947fa2", "control-id": "pcidss_4_8-3.8", "description": "The description for control-id pcidss_4_8-3.8.", "props": [ @@ -17470,7 +17424,7 @@ ] }, { - "uuid": "6970cf2b-d6f0-4d90-878f-a502d3f18cc9", + "uuid": "0cdd53dd-03cc-4933-8fe6-10c844f33fa7", "control-id": "pcidss_4_8-3.9", "description": "The requirement does not explicitily define the number of days before the password\nexpiration to warn the users, but the relevant rules were selected here as they do not\ncause any problems in combination with password lifetime rules.", "props": [ @@ -17502,7 +17456,7 @@ ] }, { - "uuid": "6a85f9d4-29e2-4d5d-a7e7-3284b4a9a190", + "uuid": "83d69afc-6a8f-4619-bcae-4c7869e6eccd", "control-id": "pcidss_4_8-3.10.1", "description": "This requirement is already covered by 8.3.9.", "props": [ @@ -17514,7 +17468,7 @@ ] }, { - "uuid": "5e2273ce-e247-494e-a60d-0e0ec120ce90", + "uuid": "7fbd9187-d01a-467c-a740-785ea90ab727", "control-id": "pcidss_4_8-3.11", "description": "The description for control-id pcidss_4_8-3.11.", "props": [ @@ -17527,7 +17481,7 @@ ] }, { - "uuid": "51acf5a8-3a89-4459-bd04-74207facbc22", + "uuid": "227d1dbb-1789-44dd-b46f-54cc3eb52308", "control-id": "pcidss_4_8-4.1", "description": "No notes for control-id 8.4.1.", "props": [ @@ -17539,7 +17493,7 @@ ] }, { - "uuid": "48947d30-52f7-4c16-866b-50803c161f7d", + "uuid": "3821b6be-7bde-430b-80c2-68e0b31396b9", "control-id": "pcidss_4_8-4.2", "description": "The description for control-id pcidss_4_8-4.2.", "props": [ @@ -17552,7 +17506,7 @@ ] }, { - "uuid": "fb72cae9-bd96-4827-9a46-793a082ca66d", + "uuid": "c178b3ed-0985-4a35-91af-ea33c21a5ebf", "control-id": "pcidss_4_8-4.3", "description": "The description for control-id pcidss_4_8-4.3.", "props": [ @@ -17565,7 +17519,7 @@ ] }, { - "uuid": "433a2628-43f5-40ef-9cd3-4925dbf651e0", + "uuid": "da8902c8-7bc9-4381-a71b-3f6e1955ae12", "control-id": "pcidss_4_8-5.1", "description": "The description for control-id pcidss_4_8-5.1.", "props": [ @@ -17578,7 +17532,7 @@ ] }, { - "uuid": "168e587f-ae58-4273-a3d7-c4a8654f252b", + "uuid": "ade49173-701c-41f1-89b7-1a37a884a2d6", "control-id": "pcidss_4_8-6.1", "description": "This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system\naccounts usage is restricted. Exceptions to system accounts should be manually checked to\nensure the requirements in description. This requirement although implements some extra\ncontrols regarding root account.", "props": [ @@ -17605,7 +17559,7 @@ ] }, { - "uuid": "b493b9b3-c0be-408b-9a24-bf5a5a81301a", + "uuid": "c5f57f73-8c51-4d35-89e1-8849541585be", "control-id": "pcidss_4_8-6.2", "description": "The description for control-id pcidss_4_8-6.2.", "props": [ @@ -17618,7 +17572,7 @@ ] }, { - "uuid": "6a484f07-1cda-44b7-94e0-9b856e1e49f1", + "uuid": "d9fd6ba8-4a06-47bd-82c7-568b7792610d", "control-id": "pcidss_4_8-6.3", "description": "Related to requirements 8.3.6 and 8.3.9.", "props": [ @@ -17630,7 +17584,7 @@ ] }, { - "uuid": "2787864e-0ff9-47e7-9c5b-0d3395386e60", + "uuid": "db283c17-87d5-4b28-93d9-3dee2e219db3", "control-id": "pcidss_4_9-1.1", "description": "The description for control-id pcidss_4_9-1.1.", "props": [ @@ -17643,7 +17597,7 @@ ] }, { - "uuid": "49c62656-efa1-4819-bc29-4a003a88475a", + "uuid": "be6688ff-15b4-402e-929d-f501d3fc77c5", "control-id": "pcidss_4_9-1.2", "description": "The description for control-id pcidss_4_9-1.2.", "props": [ @@ -17656,7 +17610,7 @@ ] }, { - "uuid": "39fdd42a-7ac4-41a0-a5e1-90ec126f066d", + "uuid": "675d9f10-624f-4d6f-b5f7-e14099465b51", "control-id": "pcidss_4_9-2.1.1", "description": "The description for control-id pcidss_4_9-2.1.1.", "props": [ @@ -17669,7 +17623,7 @@ ] }, { - "uuid": "f61d515c-59ee-46da-9c5b-f9f513a02399", + "uuid": "5a40da5d-9a11-4ed7-aad0-3969caeb3374", "control-id": "pcidss_4_9-2.2", "description": "The description for control-id pcidss_4_9-2.2.", "props": [ @@ -17682,7 +17636,7 @@ ] }, { - "uuid": "0f083407-b808-4bef-94da-5b10fbdd3277", + "uuid": "39c9685f-75ee-4a65-90a2-10d5d84fe32a", "control-id": "pcidss_4_9-2.3", "description": "The description for control-id pcidss_4_9-2.3.", "props": [ @@ -17695,7 +17649,7 @@ ] }, { - "uuid": "074054fd-2000-43fa-bc87-89479ce49031", + "uuid": "dd50277f-0e20-4bbd-9de6-659c8cbbd3f9", "control-id": "pcidss_4_9-2.4", "description": "The description for control-id pcidss_4_9-2.4.", "props": [ @@ -17708,7 +17662,7 @@ ] }, { - "uuid": "f65eb109-80d8-4979-8988-cacf66ed778e", + "uuid": "d10313af-4d76-4fb9-a382-9cc03c24b938", "control-id": "pcidss_4_9-3.1.1", "description": "The description for control-id pcidss_4_9-3.1.1.", "props": [ @@ -17721,7 +17675,7 @@ ] }, { - "uuid": "10f053aa-206d-499d-9820-084382f8a001", + "uuid": "70b8d67b-018d-4c17-b29b-4651b2732f97", "control-id": "pcidss_4_9-3.2", "description": "The description for control-id pcidss_4_9-3.2.", "props": [ @@ -17734,7 +17688,7 @@ ] }, { - "uuid": "f57cfe15-8292-4a33-a137-2c6800b95695", + "uuid": "bce4b1aa-cb3c-4d8d-ab5a-f34a8cecf610", "control-id": "pcidss_4_9-3.3", "description": "The description for control-id pcidss_4_9-3.3.", "props": [ @@ -17747,7 +17701,7 @@ ] }, { - "uuid": "2cab1c2c-64ad-4f39-8753-bd5675ab7673", + "uuid": "adb40474-c828-40a5-a5bf-11b4b6c85a7e", "control-id": "pcidss_4_9-3.4", "description": "The description for control-id pcidss_4_9-3.4.", "props": [ @@ -17760,7 +17714,7 @@ ] }, { - "uuid": "a10757e7-5dba-434e-bcf4-a421eca788af", + "uuid": "02f742b3-be21-43bc-88c1-d1c1b470a044", "control-id": "pcidss_4_9-4.1.1", "description": "The description for control-id pcidss_4_9-4.1.1.", "props": [ @@ -17773,7 +17727,7 @@ ] }, { - "uuid": "7d872387-c850-4ac2-8fb3-4bf721cde70a", + "uuid": "afc91daf-d8f3-4f55-85a5-8f425cbc199e", "control-id": "pcidss_4_9-4.1.2", "description": "The description for control-id pcidss_4_9-4.1.2.", "props": [ @@ -17786,7 +17740,7 @@ ] }, { - "uuid": "c1ef569a-86c2-4275-ab6e-c378c443df2e", + "uuid": "2e69bfe5-da08-4d13-b3f8-cbeb6d7300fc", "control-id": "pcidss_4_9-4.2", "description": "The description for control-id pcidss_4_9-4.2.", "props": [ @@ -17799,7 +17753,7 @@ ] }, { - "uuid": "57baf793-a600-4b46-b2d5-682c2f23ee01", + "uuid": "7408fa9a-1c51-4e5b-85bb-4fc5d9d5bdef", "control-id": "pcidss_4_9-4.3", "description": "The description for control-id pcidss_4_9-4.3.", "props": [ @@ -17812,7 +17766,7 @@ ] }, { - "uuid": "71fbd420-330d-4817-80e6-0802902365aa", + "uuid": "f607d8a7-96f4-4415-b81f-08bc2d48ef65", "control-id": "pcidss_4_9-4.4", "description": "The description for control-id pcidss_4_9-4.4.", "props": [ @@ -17825,7 +17779,7 @@ ] }, { - "uuid": "4f8bbc40-4f51-41f9-a419-529b95fd9e17", + "uuid": "e4333b7e-159b-4432-b737-41d4f00a1eb7", "control-id": "pcidss_4_9-4.5.1", "description": "The description for control-id pcidss_4_9-4.5.1.", "props": [ @@ -17838,7 +17792,7 @@ ] }, { - "uuid": "e59e5b33-3bf6-4c87-818b-8f8a28b6c0a9", + "uuid": "f3254228-83a6-4442-80ca-940b4d6c9fdf", "control-id": "pcidss_4_9-4.6", "description": "The description for control-id pcidss_4_9-4.6.", "props": [ @@ -17851,7 +17805,7 @@ ] }, { - "uuid": "f1b45401-df8e-45fc-a3f1-0e5ff03faecd", + "uuid": "5de5a94f-d668-47b9-8890-1aa4b38a176c", "control-id": "pcidss_4_9-4.7", "description": "The description for control-id pcidss_4_9-4.7.", "props": [ @@ -17864,7 +17818,7 @@ ] }, { - "uuid": "32081ec6-089d-4ad4-9630-6a6b6e6eb15a", + "uuid": "d138f930-d0f0-4964-bc4e-30916fe9a9eb", "control-id": "pcidss_4_9-5.1.1", "description": "The description for control-id pcidss_4_9-5.1.1.", "props": [ @@ -17877,7 +17831,7 @@ ] }, { - "uuid": "ea6efbf9-f114-4a52-b865-2a71f21244dc", + "uuid": "6f9832c9-167f-476e-89a9-daf8ce08aa64", "control-id": "pcidss_4_9-5.1.2.1", "description": "The description for control-id pcidss_4_9-5.1.2.1.", "props": [ @@ -17890,7 +17844,7 @@ ] }, { - "uuid": "e3f6188d-f3c3-4e28-bfaf-9c91f4b4a0b9", + "uuid": "d489a1f1-921b-4bce-9370-6869bb841cc3", "control-id": "pcidss_4_9-5.1.3", "description": "The description for control-id pcidss_4_9-5.1.3.", "props": [ @@ -17903,7 +17857,7 @@ ] }, { - "uuid": "939790fc-5407-467d-a743-3366e5165ea6", + "uuid": "bf83c1fd-2900-4015-a203-e2f7a991e97e", "control-id": "pcidss_4_10-1.1", "description": "The description for control-id pcidss_4_10-1.1.", "props": [ @@ -17916,7 +17870,7 @@ ] }, { - "uuid": "d8a13a45-5c75-4d1e-9eca-2c21b7adad04", + "uuid": "fada8e9e-2e7d-4fec-bb2e-d2b9f4783ce5", "control-id": "pcidss_4_10-1.2", "description": "The description for control-id pcidss_4_10-1.2.", "props": [ @@ -17929,7 +17883,7 @@ ] }, { - "uuid": "f6e21304-0816-4e83-ae01-cd513b50a788", + "uuid": "15652355-80d9-4480-b637-410e6b5f1523", "control-id": "pcidss_4_10-2.1.1", "description": "The description for control-id pcidss_4_10-2.1.1.", "props": [ @@ -17942,7 +17896,7 @@ ] }, { - "uuid": "92051570-a378-4917-a8d0-87b8e0257722", + "uuid": "92dcdfc0-23c4-4d73-9743-92e7058cb860", "control-id": "pcidss_4_10-2.1.2", "description": "Not all privileged commands have suid or sgid enabled. We probably want to include more\nrules for this requirement.", "props": [ @@ -17959,7 +17913,7 @@ ] }, { - "uuid": "76e8072e-8c60-4b80-a5d2-08b860df3726", + "uuid": "9751f0d8-fd48-42b2-b8d1-10a72689bc63", "control-id": "pcidss_4_10-2.1.3", "description": "No notes for control-id 10.2.1.3.", "props": [ @@ -18006,7 +17960,7 @@ ] }, { - "uuid": "36751f29-c8a3-4a06-ac81-8059691dbf51", + "uuid": "101b0783-91c1-42e4-b8f4-4fdac2fd3a1e", "control-id": "pcidss_4_10-2.1.4", "description": "No notes for control-id 10.2.1.4.", "props": [ @@ -18023,7 +17977,7 @@ ] }, { - "uuid": "2bc1fd58-2398-49a4-9fdc-acb14add5aa7", + "uuid": "b42b8f86-b663-4284-8255-13902e1c8634", "control-id": "pcidss_4_10-2.1.5", "description": "No notes for control-id 10.2.1.5.", "props": [ @@ -18065,7 +18019,7 @@ ] }, { - "uuid": "a7227671-ceaa-4e31-996a-ab6b007c4557", + "uuid": "4ac7ff5c-6a15-429b-9811-05deec7b0188", "control-id": "pcidss_4_10-2.1.6", "description": "The description for control-id pcidss_4_10-2.1.6.", "props": [ @@ -18078,7 +18032,7 @@ ] }, { - "uuid": "b17a0e82-5e53-4b72-b6bd-685355882727", + "uuid": "a5685301-7362-43b1-bd52-4bf40d5d19fa", "control-id": "pcidss_4_10-2.1.7", "description": "There are enough rules to capture deletion events but not for creation events.\nThis requirement needs to be better investigated to confirm which additional rules would\nsatistfy the requirement.", "props": [ @@ -18120,7 +18074,7 @@ ] }, { - "uuid": "cce233cd-f443-4c30-9c78-96f60eed9984", + "uuid": "930d93e9-4323-4f27-a47e-f29d19777e23", "control-id": "pcidss_4_10-2.2", "description": "Standard settings for audit should be enough.", "props": [ @@ -18137,7 +18091,7 @@ ] }, { - "uuid": "ad20d26e-9005-43a8-bbc7-03a205cc79ea", + "uuid": "154c6fac-c423-4f22-94d5-ac792c58da4e", "control-id": "pcidss_4_10-3.1", "description": "No notes for control-id 10.3.1.", "props": [ @@ -18164,7 +18118,7 @@ ] }, { - "uuid": "54fc0ef8-f22a-4c55-917d-26f33d191728", + "uuid": "4d417beb-31e1-4712-bbd0-dec22c12bdfd", "control-id": "pcidss_4_10-3.2", "description": "No notes for control-id 10.3.2.", "props": [ @@ -18201,7 +18155,7 @@ ] }, { - "uuid": "3b73f86a-0fb5-4972-b250-e6b7c74d149e", + "uuid": "d4757171-0d7d-4c94-a9fc-9b342284d00b", "control-id": "pcidss_4_10-3.3", "description": "Although the technologies in general allow to send logs to a centralized server, some\nparameters for this configuration are specific to each site policy and therefore the\nrequirement demands manual assessment.", "props": [ @@ -18223,7 +18177,7 @@ ] }, { - "uuid": "bca4c2ce-1a20-4d84-a731-842ca086399d", + "uuid": "60973e02-a7e2-41f3-9a9a-508290889971", "control-id": "pcidss_4_10-3.4", "description": "No notes for control-id 10.3.4.", "props": [ @@ -18310,7 +18264,7 @@ ] }, { - "uuid": "26ff579d-a803-4f8e-b6e2-6e2b21e7dea0", + "uuid": "19856a04-c945-4597-9214-3d8ce21fb98f", "control-id": "pcidss_4_10-4.1.1", "description": "The description for control-id pcidss_4_10-4.1.1.", "props": [ @@ -18323,7 +18277,7 @@ ] }, { - "uuid": "a88444c5-4ee0-4bc6-834d-609be0ec85ad", + "uuid": "f84a34d3-af0d-4c0e-8c13-b6d9d7b4ebe7", "control-id": "pcidss_4_10-4.2.1", "description": "The description for control-id pcidss_4_10-4.2.1.", "props": [ @@ -18336,7 +18290,7 @@ ] }, { - "uuid": "4df8ff24-14fb-4410-8772-d88bbe94db06", + "uuid": "d97e8e5c-2909-4fae-aa99-b3e64f04683e", "control-id": "pcidss_4_10-4.3", "description": "The description for control-id pcidss_4_10-4.3.", "props": [ @@ -18349,7 +18303,7 @@ ] }, { - "uuid": "9182c1a8-7ede-4825-83f9-0d2be767e0c4", + "uuid": "fd0fd235-f677-45ad-b498-e157c4ff5e36", "control-id": "pcidss_4_10-5.1", "description": "It is not simple to ensure 12 months history is present in each system but the rules in\nthis requirement ensures the logs are not lost without administrators awareness.", "props": [ @@ -18386,7 +18340,7 @@ ] }, { - "uuid": "c9d1b700-eeb4-456d-b9fd-1d4d92be5d24", + "uuid": "38470256-eae1-4228-9698-ca8e4cd08ebd", "control-id": "pcidss_4_10-6.1", "description": "Maybe it is possible to optmize some similar rules related to ntp.", "props": [ @@ -18403,7 +18357,7 @@ ] }, { - "uuid": "bab1eb2c-9480-4463-abda-a576a2ea5ccb", + "uuid": "dbf7bdc9-3f56-421d-b3d4-01e4de2bdbb1", "control-id": "pcidss_4_10-6.2", "description": "The selected rules might need updates in order to restrict their platform applicability\nto avoid conflicts.", "props": [ @@ -18420,7 +18374,7 @@ ] }, { - "uuid": "a8b5c2de-f7b4-4770-9e28-cd92db29844f", + "uuid": "13ed4277-c090-419e-a79e-54f28004f55c", "control-id": "pcidss_4_10-6.3", "description": "No notes for control-id 10.6.3.", "props": [ @@ -18462,7 +18416,7 @@ ] }, { - "uuid": "3a2e659c-50b7-4422-ada2-447fc74a9d43", + "uuid": "725234f7-537b-471e-b7a0-f280a96adfee", "control-id": "pcidss_4_10-7.1", "description": "The description for control-id pcidss_4_10-7.1.", "props": [ @@ -18475,7 +18429,7 @@ ] }, { - "uuid": "57ea8f88-dc2d-4208-954e-3ff90ad7397f", + "uuid": "f9416503-2a88-432c-b873-883cc5dac5cb", "control-id": "pcidss_4_10-7.2", "description": "No notes for control-id 10.7.2.", "props": [ @@ -18497,7 +18451,7 @@ ] }, { - "uuid": "b9141d7f-868b-4d0d-a3b2-3c3a82418d43", + "uuid": "08b5ebb4-6af3-45f3-8119-cc2e0c823030", "control-id": "pcidss_4_10-7.3", "description": "The description for control-id pcidss_4_10-7.3.", "props": [ @@ -18510,7 +18464,7 @@ ] }, { - "uuid": "a46ca395-0fcc-43b6-ac81-310a2640ad5a", + "uuid": "cb49b297-80cd-4c13-aed4-bf8c15f8bf6b", "control-id": "pcidss_4_11-1.1", "description": "The description for control-id pcidss_4_11-1.1.", "props": [ @@ -18523,7 +18477,7 @@ ] }, { - "uuid": "c4d61f97-1180-4a29-97a3-4725446d7f38", + "uuid": "af942357-0c33-496f-b799-517e16f2db13", "control-id": "pcidss_4_11-1.2", "description": "The description for control-id pcidss_4_11-1.2.", "props": [ @@ -18536,7 +18490,7 @@ ] }, { - "uuid": "a8e75b2a-ff4c-4261-9695-2d03b6390b15", + "uuid": "46124341-3e1b-4e04-95d8-6fd5cb1d2086", "control-id": "pcidss_4_11-2.1", "description": "The description for control-id pcidss_4_11-2.1.", "props": [ @@ -18549,7 +18503,7 @@ ] }, { - "uuid": "028b1395-cc14-48b8-ad80-439eac016a9f", + "uuid": "57541b36-9d14-4f50-bd0c-bbd476574dce", "control-id": "pcidss_4_11-2.2", "description": "The description for control-id pcidss_4_11-2.2.", "props": [ @@ -18562,7 +18516,7 @@ ] }, { - "uuid": "68b09be4-95ce-42b6-aaa5-cfe413075e79", + "uuid": "dbba015e-0959-47e6-9bbc-1c233d227d05", "control-id": "pcidss_4_11-3.1.1", "description": "The description for control-id pcidss_4_11-3.1.1.", "props": [ @@ -18575,7 +18529,7 @@ ] }, { - "uuid": "09e5c6dd-5138-4fb0-83d6-4325b99f4358", + "uuid": "89c49e32-61d2-43ee-aced-de8d0d8639b0", "control-id": "pcidss_4_11-3.1.2", "description": "The description for control-id pcidss_4_11-3.1.2.", "props": [ @@ -18588,7 +18542,7 @@ ] }, { - "uuid": "2aa11b7f-dd27-4b37-a9b9-e69a6cf1a267", + "uuid": "370a9206-3779-41c5-b0f8-bd83f488a4c4", "control-id": "pcidss_4_11-3.1.3", "description": "The description for control-id pcidss_4_11-3.1.3.", "props": [ @@ -18601,7 +18555,7 @@ ] }, { - "uuid": "1a8beba5-b178-4ab1-86ab-f20577d102bd", + "uuid": "0dafab5c-f5aa-4180-b4f2-bc7efd18c359", "control-id": "pcidss_4_11-3.2.1", "description": "The description for control-id pcidss_4_11-3.2.1.", "props": [ @@ -18614,7 +18568,7 @@ ] }, { - "uuid": "af0e327e-d584-4888-91b9-6f8a07b131da", + "uuid": "5638d56a-b4f7-4fff-b93a-a18db7e3c6c5", "control-id": "pcidss_4_11-4.1", "description": "The description for control-id pcidss_4_11-4.1.", "props": [ @@ -18627,7 +18581,7 @@ ] }, { - "uuid": "35d60303-d1a1-4d2d-8acb-4208e9a35e58", + "uuid": "67b87776-c16e-49b4-a2c9-44702aa1ffd1", "control-id": "pcidss_4_11-4.2", "description": "The description for control-id pcidss_4_11-4.2.", "props": [ @@ -18640,7 +18594,7 @@ ] }, { - "uuid": "163feeff-8a77-415e-af64-0392d07f367e", + "uuid": "0c28b8fb-4ef8-46ee-864f-84729c093cc3", "control-id": "pcidss_4_11-4.3", "description": "The description for control-id pcidss_4_11-4.3.", "props": [ @@ -18653,7 +18607,7 @@ ] }, { - "uuid": "4672cc13-ec8a-4348-94cb-3e32e4afb20d", + "uuid": "b7adb74f-868a-43d1-8add-4ff48e259f85", "control-id": "pcidss_4_11-4.4", "description": "The description for control-id pcidss_4_11-4.4.", "props": [ @@ -18666,7 +18620,7 @@ ] }, { - "uuid": "a3c65f42-9af6-4d95-bbf4-42d8c3c71100", + "uuid": "983c0f13-c8a4-43db-bc5d-d66e99f90f7d", "control-id": "pcidss_4_11-4.5", "description": "The description for control-id pcidss_4_11-4.5.", "props": [ @@ -18679,7 +18633,7 @@ ] }, { - "uuid": "cb72fb26-e2da-484b-bc5a-3468efbe75f1", + "uuid": "a7d26366-5dfe-495d-8ad2-219d6eece3be", "control-id": "pcidss_4_11-4.6", "description": "The description for control-id pcidss_4_11-4.6.", "props": [ @@ -18692,7 +18646,7 @@ ] }, { - "uuid": "361e1908-1d41-44e6-9f30-a4f9bca94d88", + "uuid": "fb734086-d012-4d00-a0c9-20225ad01050", "control-id": "pcidss_4_11-4.7", "description": "The description for control-id pcidss_4_11-4.7.", "props": [ @@ -18705,7 +18659,7 @@ ] }, { - "uuid": "1b45c1a7-2b9f-4a37-9487-3a765d380462", + "uuid": "e97c81a9-126c-41b2-874a-fed9c29cce6a", "control-id": "pcidss_4_11-5.1.1", "description": "The description for control-id pcidss_4_11-5.1.1.", "props": [ @@ -18718,7 +18672,7 @@ ] }, { - "uuid": "b8764a30-42e6-42c4-bd75-351aa3f695ab", + "uuid": "ba8961c7-4902-4443-953b-94c1ac2842f2", "control-id": "pcidss_4_11-5.2", "description": "No notes for control-id 11.5.2.", "props": [ @@ -18755,7 +18709,7 @@ ] }, { - "uuid": "2c1a6462-0509-4988-82ec-d30717f11cd4", + "uuid": "0bd444b4-8cbd-401f-9c21-bf3dcd3dbd4d", "control-id": "pcidss_4_11-6.1", "description": "The description for control-id pcidss_4_11-6.1.", "props": [ @@ -18768,7 +18722,7 @@ ] }, { - "uuid": "fbbefd68-ec97-4294-849b-8edf90511657", + "uuid": "c632e6f0-1ea5-4c7d-9a3c-fc1852ef8274", "control-id": "pcidss_4_12-1.1", "description": "The description for control-id pcidss_4_12-1.1.", "props": [ @@ -18781,7 +18735,7 @@ ] }, { - "uuid": "5cd7f2b8-71d3-426c-9328-bbc705229ede", + "uuid": "5c7ae5c4-7f05-49be-aef1-2e026c68922f", "control-id": "pcidss_4_12-1.2", "description": "The description for control-id pcidss_4_12-1.2.", "props": [ @@ -18794,7 +18748,7 @@ ] }, { - "uuid": "dcde4975-b3d4-4d9a-b36f-28428ddff3b4", + "uuid": "fc764787-a046-4872-9f8c-4445c497682f", "control-id": "pcidss_4_12-1.3", "description": "The description for control-id pcidss_4_12-1.3.", "props": [ @@ -18807,7 +18761,7 @@ ] }, { - "uuid": "36dca97d-0009-4295-8818-de9c7b70452d", + "uuid": "8a76d724-8b9a-4bb7-85c6-4446a78ff801", "control-id": "pcidss_4_12-1.4", "description": "The description for control-id pcidss_4_12-1.4.", "props": [ @@ -18820,7 +18774,7 @@ ] }, { - "uuid": "9863c807-a3a6-4479-8612-ac4785066c4f", + "uuid": "77db0c3e-1112-43c8-bc36-fc2e6b76ab9c", "control-id": "pcidss_4_12-2.1", "description": "The description for control-id pcidss_4_12-2.1.", "props": [ @@ -18833,7 +18787,7 @@ ] }, { - "uuid": "4eeeea85-36f0-4b88-9ca2-54e65b4863f0", + "uuid": "cfed53b2-c1d4-4776-8a59-9512179b3f56", "control-id": "pcidss_4_12-3.1", "description": "The description for control-id pcidss_4_12-3.1.", "props": [ @@ -18846,7 +18800,7 @@ ] }, { - "uuid": "fe965194-943d-4b3d-98e1-fa5a6e38ab42", + "uuid": "e90db7b5-33b7-4dea-9983-69cc3fb56966", "control-id": "pcidss_4_12-3.2", "description": "The description for control-id pcidss_4_12-3.2.", "props": [ @@ -18859,7 +18813,7 @@ ] }, { - "uuid": "d241f7c9-e331-49a8-a515-6035ddf98504", + "uuid": "b119dfbc-9924-4dde-b0c0-2cf88233c215", "control-id": "pcidss_4_12-3.3", "description": "The description for control-id pcidss_4_12-3.3.", "props": [ @@ -18872,7 +18826,7 @@ ] }, { - "uuid": "3f2e86a4-b343-4bb5-825e-bcfb9ca52ec4", + "uuid": "f17da77e-d8c7-4386-bcf8-bfd8b65bbed1", "control-id": "pcidss_4_12-3.4", "description": "The description for control-id pcidss_4_12-3.4.", "props": [ @@ -18885,7 +18839,7 @@ ] }, { - "uuid": "386e61f7-c1ef-4c7b-b53d-ac0cc45c232e", + "uuid": "d2571548-16a4-4f20-9245-3d7b7a48bc6f", "control-id": "pcidss_4_12-4.1", "description": "The description for control-id pcidss_4_12-4.1.", "props": [ @@ -18898,7 +18852,7 @@ ] }, { - "uuid": "535d9cc6-c6d3-4911-84d7-c3eaafa5a8da", + "uuid": "cde8f29d-3b2b-48e4-84a7-0ac05531f3ec", "control-id": "pcidss_4_12-4.2.1", "description": "The description for control-id pcidss_4_12-4.2.1.", "props": [ @@ -18911,7 +18865,7 @@ ] }, { - "uuid": "ae11eaf6-d655-4ac8-8e26-58ffd1761358", + "uuid": "3a308115-2774-4406-9e9c-85c4b8318079", "control-id": "pcidss_4_12-5.1", "description": "The description for control-id pcidss_4_12-5.1.", "props": [ @@ -18924,7 +18878,7 @@ ] }, { - "uuid": "fee44b7d-f71a-47e5-96e3-66407e5a01d7", + "uuid": "00a9ead6-37fc-4b9a-8215-dd1d8f929bb2", "control-id": "pcidss_4_12-5.2.1", "description": "The description for control-id pcidss_4_12-5.2.1.", "props": [ @@ -18937,7 +18891,7 @@ ] }, { - "uuid": "e1ecc7f3-2822-4b0e-a966-04ccb896558a", + "uuid": "7c00fd9d-1203-447a-acc4-59baf4e7fc07", "control-id": "pcidss_4_12-5.3", "description": "The description for control-id pcidss_4_12-5.3.", "props": [ @@ -18950,7 +18904,7 @@ ] }, { - "uuid": "ac58eede-87af-4c14-9777-5811c6a21650", + "uuid": "4da56ded-68a2-4a9f-a442-028afb627f8e", "control-id": "pcidss_4_12-6.1", "description": "The description for control-id pcidss_4_12-6.1.", "props": [ @@ -18963,7 +18917,7 @@ ] }, { - "uuid": "0c12a056-81e2-4854-9897-b577adf35eb7", + "uuid": "e6366d0e-7855-4bdb-9af7-3a19a7e2c75f", "control-id": "pcidss_4_12-6.2", "description": "The description for control-id pcidss_4_12-6.2.", "props": [ @@ -18976,7 +18930,7 @@ ] }, { - "uuid": "8687dfd0-4a11-4e9f-b86f-d4f56139a359", + "uuid": "86955ecc-55aa-46b8-9257-6a16cdaacbf0", "control-id": "pcidss_4_12-6.3.1", "description": "The description for control-id pcidss_4_12-6.3.1.", "props": [ @@ -18989,7 +18943,7 @@ ] }, { - "uuid": "76878278-0437-483f-9ab5-0b7e8c08634e", + "uuid": "415bdf9f-b475-41eb-81b1-2d433a53c278", "control-id": "pcidss_4_12-6.3.2", "description": "The description for control-id pcidss_4_12-6.3.2.", "props": [ @@ -19002,7 +18956,7 @@ ] }, { - "uuid": "0b37a164-90a3-428c-9dc3-179caf2aad66", + "uuid": "fc40e22f-ddff-4505-9ead-e7fd40c1a854", "control-id": "pcidss_4_12-7.1", "description": "The description for control-id pcidss_4_12-7.1.", "props": [ @@ -19015,7 +18969,7 @@ ] }, { - "uuid": "77908715-36d4-4de3-af78-a41a45d1b58e", + "uuid": "b4fdfd77-c3d6-41cc-8651-c3926f348e60", "control-id": "pcidss_4_12-8.1", "description": "The description for control-id pcidss_4_12-8.1.", "props": [ @@ -19028,7 +18982,7 @@ ] }, { - "uuid": "fce0b6b7-c0bc-467e-a95f-5e7c33eb3c68", + "uuid": "c5e386d5-eed8-49ae-8cfd-fdf69fad96eb", "control-id": "pcidss_4_12-8.2", "description": "The description for control-id pcidss_4_12-8.2.", "props": [ @@ -19041,7 +18995,7 @@ ] }, { - "uuid": "ecbf979a-2ba4-446f-a0da-6c933dfa89b4", + "uuid": "7dab9233-af50-4464-bb1d-aad35111a641", "control-id": "pcidss_4_12-8.3", "description": "The description for control-id pcidss_4_12-8.3.", "props": [ @@ -19054,7 +19008,7 @@ ] }, { - "uuid": "96636479-740b-4981-8ff8-b8c0a4fe05e5", + "uuid": "59132c77-a404-4bc3-8043-02cbabb0c3da", "control-id": "pcidss_4_12-8.4", "description": "The description for control-id pcidss_4_12-8.4.", "props": [ @@ -19067,7 +19021,7 @@ ] }, { - "uuid": "af7dbddb-3c85-4b74-ae29-79b005a4c5ad", + "uuid": "980b565c-0740-4fc4-a96e-a69a7fe61478", "control-id": "pcidss_4_12-8.5", "description": "The description for control-id pcidss_4_12-8.5.", "props": [ @@ -19080,7 +19034,7 @@ ] }, { - "uuid": "acc2271f-d051-4c76-b35a-21b7d5475991", + "uuid": "4a3dde2d-3cba-43ba-82be-3cd936bc052b", "control-id": "pcidss_4_12-9.1", "description": "The description for control-id pcidss_4_12-9.1.", "props": [ @@ -19093,7 +19047,7 @@ ] }, { - "uuid": "fd11efb2-72eb-4006-8fd1-70215bca6e56", + "uuid": "67f6adea-51f5-41c7-a1f2-7497439f8b04", "control-id": "pcidss_4_12-9.2", "description": "The description for control-id pcidss_4_12-9.2.", "props": [ @@ -19106,7 +19060,7 @@ ] }, { - "uuid": "0d3af4aa-881f-41e0-95ec-15c7703193fd", + "uuid": "03dc2ded-d4ee-43c7-abfa-71a20526833e", "control-id": "pcidss_4_12-10.1", "description": "The description for control-id pcidss_4_12-10.1.", "props": [ @@ -19119,7 +19073,7 @@ ] }, { - "uuid": "a547a883-6295-44db-ba41-be3082a2b2a6", + "uuid": "001c8c4d-4a8f-4ef1-a180-1effe6715e21", "control-id": "pcidss_4_12-10.2", "description": "The description for control-id pcidss_4_12-10.2.", "props": [ @@ -19132,7 +19086,7 @@ ] }, { - "uuid": "80b7a461-2478-4661-8099-7767de244845", + "uuid": "72a754c9-a3b8-411d-9d86-dc5c6f1ca0fe", "control-id": "pcidss_4_12-10.3", "description": "The description for control-id pcidss_4_12-10.3.", "props": [ @@ -19145,7 +19099,7 @@ ] }, { - "uuid": "9bbe9b17-2573-4b22-8f9b-1d4190d38905", + "uuid": "d9f9d43d-eda9-4dc2-b9a0-f3a2e57345c9", "control-id": "pcidss_4_12-10.4.1", "description": "The description for control-id pcidss_4_12-10.4.1.", "props": [ @@ -19158,7 +19112,7 @@ ] }, { - "uuid": "62a8ccaa-6fa0-4723-9348-c4574176a93e", + "uuid": "3ed7464e-9475-4b42-a800-24b70b1a80ff", "control-id": "pcidss_4_12-10.5", "description": "The description for control-id pcidss_4_12-10.5.", "props": [ @@ -19171,7 +19125,7 @@ ] }, { - "uuid": "0b083488-afc7-425f-b250-5d2bc6841139", + "uuid": "c1b91d81-bb44-4c8a-8066-716bf0d4750c", "control-id": "pcidss_4_12-10.6", "description": "The description for control-id pcidss_4_12-10.6.", "props": [ @@ -19184,7 +19138,7 @@ ] }, { - "uuid": "77e49e1c-b205-44ef-9b80-6ebf3ead372e", + "uuid": "6164e3eb-c4b8-4418-9d6b-79c935924843", "control-id": "pcidss_4_12-10.7", "description": "The description for control-id pcidss_4_12-10.7.", "props": [ @@ -19197,7 +19151,7 @@ ] }, { - "uuid": "e5c48f0a-62d8-4e3e-823f-7f8e95220184", + "uuid": "4c76f40c-f1a2-450b-8b71-acddf5da0f1d", "control-id": "a1-1.1", "description": "The description for control-id a1-1.1.", "props": [ @@ -19210,7 +19164,7 @@ ] }, { - "uuid": "ddeaa1db-d764-473b-90f3-5c5f21f8d804", + "uuid": "cc1b3416-72a7-4b31-857b-b11e3c66f706", "control-id": "a1-1.2", "description": "The description for control-id a1-1.2.", "props": [ @@ -19223,7 +19177,7 @@ ] }, { - "uuid": "c23ff4e7-6e22-478e-a0e8-2f08735cb1f2", + "uuid": "d22b2229-90df-4811-94bc-f57d93fda66f", "control-id": "a1-1.3", "description": "The description for control-id a1-1.3.", "props": [ @@ -19236,7 +19190,7 @@ ] }, { - "uuid": "75a2f847-1704-43a1-a6de-bb7f30cef437", + "uuid": "9ef497a6-46f6-4577-8e46-a417a6494b7e", "control-id": "a1-1.4", "description": "The description for control-id a1-1.4.", "props": [ @@ -19249,7 +19203,7 @@ ] }, { - "uuid": "5e38556d-22fc-403e-82a3-606cabb38aab", + "uuid": "b9828fa2-6494-4a8c-a60e-9a1865db6646", "control-id": "a1-2.1", "description": "The description for control-id a1-2.1.", "props": [ @@ -19262,7 +19216,7 @@ ] }, { - "uuid": "742aae3a-d4f7-4ec5-a2c9-cf0ba8db4ed9", + "uuid": "e377f2da-4629-49dd-919a-5aa738142433", "control-id": "a1-2.2", "description": "The description for control-id a1-2.2.", "props": [ @@ -19275,7 +19229,7 @@ ] }, { - "uuid": "f19e6a30-ae72-4831-a9e5-e9595208455a", + "uuid": "eb9c4339-87ce-4afd-a4f3-2de1e7636c1a", "control-id": "a1-2.3", "description": "The description for control-id a1-2.3.", "props": [ @@ -19288,7 +19242,7 @@ ] }, { - "uuid": "42172b0e-e240-4fd1-8b9c-625aa87ef8cb", + "uuid": "dbb01596-4061-46a3-a43a-136439200164", "control-id": "a2-1.1", "description": "The description for control-id a2-1.1.", "props": [ @@ -19301,7 +19255,7 @@ ] }, { - "uuid": "d4a2b5ac-7a12-4c22-a2af-3624f2deaa0f", + "uuid": "6c01d7f1-d8d3-47c1-b0ae-a2cc03411c8d", "control-id": "a2-1.2", "description": "The description for control-id a2-1.2.", "props": [ @@ -19314,7 +19268,7 @@ ] }, { - "uuid": "5394b207-cf1e-4652-b8e9-1c9bc4d5e198", + "uuid": "7d0acae4-4dc1-49f3-9976-47a2ba2104db", "control-id": "a2-1.3", "description": "The description for control-id a2-1.3.", "props": [ @@ -19327,7 +19281,7 @@ ] }, { - "uuid": "5938c572-d2f3-41c1-b373-91e939874683", + "uuid": "a8e93ed7-3fc4-48e7-ad80-26f24e0dab60", "control-id": "a3-1.1", "description": "The description for control-id a3-1.1.", "props": [ @@ -19340,7 +19294,7 @@ ] }, { - "uuid": "e0dbacd1-deca-46f3-aac2-c07ea1e09b48", + "uuid": "591bca82-9b23-4526-bff2-92638aa49e61", "control-id": "a3-1.2", "description": "The description for control-id a3-1.2.", "props": [ @@ -19353,7 +19307,7 @@ ] }, { - "uuid": "044585e2-1b97-4615-9353-4b074e2c96af", + "uuid": "259b103b-5050-4769-855b-b92cb250e0d1", "control-id": "a3-1.3", "description": "The description for control-id a3-1.3.", "props": [ @@ -19366,7 +19320,7 @@ ] }, { - "uuid": "0d6dd02d-b058-43a5-8427-3c3b40d635ce", + "uuid": "87731ea3-5e70-4216-ad82-3a12119f9e6b", "control-id": "a3-1.4", "description": "The description for control-id a3-1.4.", "props": [ @@ -19379,7 +19333,7 @@ ] }, { - "uuid": "cbab4aaf-67f7-429b-9743-bae28e2cac96", + "uuid": "a5dcb2ea-d748-42aa-b1b7-0f0fc2bcfaca", "control-id": "a3-2.1", "description": "The description for control-id a3-2.1.", "props": [ @@ -19392,7 +19346,7 @@ ] }, { - "uuid": "267bb304-8f17-41cf-853d-69e15a9cc02e", + "uuid": "d4535524-0126-4d52-9369-3b5ee3662993", "control-id": "a3-2.2.1", "description": "The description for control-id a3-2.2.1.", "props": [ @@ -19405,7 +19359,7 @@ ] }, { - "uuid": "51c9d7f0-ff1b-4d56-8119-8d7801c0dc4b", + "uuid": "b7a95985-03c8-4b3e-ae33-2172b9170c64", "control-id": "a3-2.3", "description": "The description for control-id a3-2.3.", "props": [ @@ -19418,7 +19372,7 @@ ] }, { - "uuid": "2f4cbaa5-4d2b-4fdf-b5c8-4b8675899916", + "uuid": "a2fb7c3c-8147-48c6-927d-f7e94ad582c4", "control-id": "a3-2.4", "description": "The description for control-id a3-2.4.", "props": [ @@ -19431,7 +19385,7 @@ ] }, { - "uuid": "3bfdf5f7-28fb-413b-a0e3-d24c76b9bf8d", + "uuid": "47914fcb-b990-4331-903c-e714d5fa3f57", "control-id": "a3-2.5.1", "description": "The description for control-id a3-2.5.1.", "props": [ @@ -19444,7 +19398,7 @@ ] }, { - "uuid": "ae9d3bb3-b981-4de0-bf08-4a39cc47b742", + "uuid": "48915c91-4d43-4db2-9a12-d97915500f67", "control-id": "a3-2.5.2", "description": "The description for control-id a3-2.5.2.", "props": [ @@ -19457,7 +19411,7 @@ ] }, { - "uuid": "7a249894-6f0f-440f-ad6f-dda94e2dfef3", + "uuid": "bc68f7b4-cd67-437f-b8df-e60a8c8a06a4", "control-id": "a3-2.6.1", "description": "The description for control-id a3-2.6.1.", "props": [ @@ -19470,7 +19424,7 @@ ] }, { - "uuid": "0e54393e-a14b-4d46-954f-b7fcbccc627b", + "uuid": "4baf9a63-93f7-46cb-b280-f33dda48f42a", "control-id": "a3-3.1.2", "description": "The description for control-id a3-3.1.2.", "props": [ @@ -19483,7 +19437,7 @@ ] }, { - "uuid": "28414f51-554b-4041-8d01-feed67748cb7", + "uuid": "d3040f8b-dc7b-4693-864b-7ead996cc1a0", "control-id": "a3-3.2", "description": "The description for control-id a3-3.2.", "props": [ @@ -19496,7 +19450,7 @@ ] }, { - "uuid": "4633c099-72cb-41ab-b88e-2f8fb2682ec2", + "uuid": "2a844105-887e-4c8a-afdd-cc9f5b86bae2", "control-id": "a3-3.3", "description": "The description for control-id a3-3.3.", "props": [ @@ -19509,7 +19463,7 @@ ] }, { - "uuid": "d1b657b7-7a8e-4e76-ada1-3dd005d0e809", + "uuid": "86079319-2c14-4896-b5be-d48a2a797ee6", "control-id": "a3-4.1", "description": "The description for control-id a3-4.1.", "props": [ @@ -19522,7 +19476,7 @@ ] }, { - "uuid": "4323c2f3-9c96-4cd9-949f-15ce127b1057", + "uuid": "99cf6abb-af84-454d-8758-5e6632546309", "control-id": "a3-5.1", "description": "The description for control-id a3-5.1.", "props": [