Skip to content

Commit 48ec5df

Browse files
Merge pull request #14514 from teacup-on-rockingchair/sle16_anssi_rules
Add more rules for SLE16 ANSSI profiles
2 parents d37c4c4 + 2aa291a commit 48ec5df

32 files changed

Lines changed: 223 additions & 177 deletions

File tree

linux_os/guide/services/dhcp/disabling_dhcp_server/package_kea_removed/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ severity: medium
1616
identifiers:
1717
cce@rhel8: CCE-87348-9
1818
cce@rhel10: CCE-86596-4
19+
cce@sle16: CCE-96693-7
1920

2021
{{{ complete_ocil_entry_package(package="kea") }}}
2122

linux_os/guide/services/ntp/service_chronyd_enabled/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ identifiers:
2525
cce@rhel9: CCE-84217-9
2626
cce@rhel10: CCE-90511-7
2727
cce@sle15: CCE-92601-4
28+
cce@sle16: CCE-96684-6
2829

2930
references:
3031
srg: SRG-OS-000355-GPOS-00143

linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ identifiers:
3030
cce@rhel9: CCE-83587-6
3131
cce@rhel10: CCE-87388-5
3232
cce@sle15: CCE-85842-3
33+
cce@sle16: CCE-96664-8
3334

3435
references:
3536
cis-csc: 1,12,15,16

linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_deny_root/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ identifiers:
2525
cce@rhel10: CCE-87975-9
2626
cce@sle12: CCE-91468-9
2727
cce@sle15: CCE-91171-9
28+
cce@sle16: CCE-96663-0
2829

2930
references:
3031
cis-csc: 1,12,15,16

linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_interval/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ identifiers:
2929
cce@rhel9: CCE-83583-5
3030
cce@rhel10: CCE-86672-3
3131
cce@sle15: CCE-91169-3
32+
cce@sle16: CCE-96665-5
3233

3334
references:
3435
cis-csc: 1,12,15,16

linux_os/guide/system/accounts/accounts-pam/locking_out_password_attempts/accounts_passwords_pam_faillock_unlock_time/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ identifiers:
3131
cce@rhel9: CCE-83588-4
3232
cce@rhel10: CCE-89250-5
3333
cce@sle15: CCE-85841-5
34+
cce@sle16: CCE-96666-3
3435

3536
references:
3637
cis-csc: 1,12,15,16

linux_os/guide/system/accounts/accounts-restrictions/password_storage/accounts_password_pam_unix_rounds_password_auth/ansible/shared.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
{{{ ansible_instantiate_variables("var_password_pam_unix_rounds") }}}
88

9-
{{% if product in ["sle12", "sle15"] %}}
9+
{{% if product in ["sle12", "sle15", "sle16"] %}}
1010
{{{ ansible_ensure_pam_module_configuration('/etc/pam.d/common-password', 'password', 'sufficient', 'pam_unix.so', 'rounds', '{{ var_password_pam_unix_rounds }}', '', rule_id=rule_id, rule_title=rule_title) }}}
1111
{{% else %}}
1212
{{{ ansible_ensure_pam_module_configuration('/etc/pam.d/password-auth', 'password', 'sufficient', 'pam_unix.so', 'rounds', '{{ var_password_pam_unix_rounds }}', '', rule_id=rule_id, rule_title=rule_title) }}}

linux_os/guide/system/accounts/accounts-restrictions/password_storage/accounts_password_pam_unix_rounds_password_auth/bash/shared.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
{{{ bash_instantiate_variables("var_password_pam_unix_rounds") }}}
44

5-
{{% if product in ["sle12", "sle15"] %}}
5+
{{% if product in ["sle12", "sle15", "sle16"] %}}
66
{{{ bash_ensure_pam_module_configuration('/etc/pam.d/common-password', 'password', 'sufficient', 'pam_unix.so', 'rounds', "$var_password_pam_unix_rounds", '') }}}
77
{{% elif product in ["debian12", "debian13"] %}}
88
{{{ bash_ensure_pam_module_configuration('/etc/pam.d/common-password', 'password', '\[success=1 default=ignore\]', 'pam_unix.so', 'rounds', "$var_password_pam_unix_rounds", '') }}}

linux_os/guide/system/accounts/accounts-restrictions/password_storage/accounts_password_pam_unix_rounds_password_auth/oval/shared.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{% if product in ["sle12", "sle15", "debian12", "debian13", 'ubuntu2204', 'ubuntu2404'] %}}
1+
{{% if product in ["debian12", "debian13", "sle12", "sle15", "sle16", "ubuntu2204", "ubuntu2404"] %}}
22
{{% set pam_passwd_file_path = "/etc/pam.d/common-password" %}}
33
{{% else %}}
44
{{% set pam_passwd_file_path = "/etc/pam.d/password-auth" %}}

linux_os/guide/system/accounts/accounts-restrictions/password_storage/accounts_password_pam_unix_rounds_password_auth/rule.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ documentation_complete: true
33

44
title: 'Set number of Password Hashing Rounds - password-auth'
55

6-
{{% if product in ["sle12", "sle15", "debian12", "debian13", 'ubuntu2204', 'ubuntu2404'] %}}
6+
{{% if product in ["debian12", "debian13", "sle12", "sle15", "sle16", "ubuntu2204", "ubuntu2404"] %}}
77
{{% set pam_passwd_file_path = "/etc/pam.d/common-password" %}}
88
{{% else %}}
99
{{% set pam_passwd_file_path = "/etc/pam.d/password-auth" %}}
@@ -19,7 +19,7 @@ description: |-
1919
<pre>password [success=1 default=ignore] pam_unix.so <i>...existing_options...</i> rounds={{{ xccdf_value("var_password_pam_unix_rounds") }}}</pre>
2020
{{% else %}}
2121
<pre>password sufficient pam_unix.so <i>...existing_options...</i> rounds={{{ xccdf_value("var_password_pam_unix_rounds") }}}</pre>
22-
22+
2323
The system's default number of rounds is 5000.
2424
{{% endif %}}
2525
@@ -67,5 +67,5 @@ fixtext: |-
6767
{{% else %}}
6868
password sufficient pam_unix.so sha512 rounds=5000
6969
{{% endif %}}
70-
70+
7171
srg_requirement: '{{{ full_name }}} shadow password suite must be configured to use a sufficient number of hashing rounds in {{{ pam_passwd_file_path }}}.'

0 commit comments

Comments
 (0)