178178 <check distro =" SLES" command =" CheckMatchingLinesAll" path =" /etc/pam.d/common-password" filter =" password\s+(?:requisite|required)\s+pam_cracklib\.so" regex =" (try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))" />
179179 <check distro =" CentOS=6|RedHat=6|Oracle=6" command =" CheckMatchingLinesAll" path =" /etc/pam.d/system-auth" filter =" password\s+(?:requisite|required)\s+pam_cracklib\.so" regex =" (try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))" />
180180 <check distro =" CentOS=6|RedHat=6|Oracle=6" command =" CheckMatchingLinesAll" path =" /etc/pam.d/password-auth" filter =" password\s+(?:requisite|required)\s+pam_cracklib\.so" regex =" (try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))" />
181- <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner" command =" CheckFileExists" path =" /etc/security/pwquality.conf" />
182- <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner" command =" CheckPwQuality" path =" /etc/security/pwquality.conf" />
181+ <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner|AlmaLinux|Rocky " command =" CheckFileExists" path =" /etc/security/pwquality.conf" />
182+ <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner|AlmaLinux|Rocky " command =" CheckPwQuality" path =" /etc/security/pwquality.conf" />
183183 </audit >
184184
185185 <audit
202202 <check distro =" *" command =" CheckUserDirs" expect =" exists" />
203203 </audit >
204204
205- <audit
206- description =" Ensure users own their home directories"
205+ <audit
206+ description =" Ensure users own their home directories"
207207 msid =" 6.2.9"
208208 impact =" Since the user is accountable for files stored in the user home directory, the user must be the owner of the directory."
209209 remediation =" Change the ownership of any home directories that are not owned by the defined user to the correct user."
302302 </audit >
303303 </audits >
304304 <remediations >
305- <!--
305+ <!--
306306 Remediations are preformed in the order they appear in this file.
307307 All actions in a remediation that match the distro are performed, and in the order they appear.
308308 -->
316316 <action distro =" *" action =" ActionEditConfig" name =" fs.suid_dumpable" value =" 0" value-regex =" [0-9]+" sep =" =" path =" /etc/sysctl.conf" />
317317 <action distro =" *" action =" ActionScript" >
318318 <script >
319- <![CDATA[
319+ <![CDATA[
320320sysctl -w fs.suid_dumpable=0
321321 ]]>
322322 </script >
@@ -341,8 +341,8 @@ sysctl -w fs.suid_dumpable=0
341341
342342 <remediation id =" enable-password-requirements" msids =" 5.3.1" description =" Ensure password creation requirements are configured" >
343343 <action distro =" Ubuntu|Debian" action =" ActionInstallPackage" package =" libpam-pwquality" />
344- <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian" action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minlen" sep =" = " value =" 14" value-regex =" [1-9][0-9]*" />
345- <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian" action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minclass" sep =" = " value =" 4" value-regex =" [0-4]" />
344+ <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|AlmaLinux|Rocky " action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minlen" sep =" = " value =" 14" value-regex =" [1-9][0-9]*" />
345+ <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|AlmaLinux|Rocky " action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minclass" sep =" = " value =" 4" value-regex =" [0-4]" />
346346 </remediation >
347347
348348 </remediations >
0 commit comments