~/f/scap-security-guide/RPMS.2017 ~/f/scap-security-guide ~/f/scap-security-guide RPMS.2017/scap-security-guide-0.1.73-1.1.noarch.rpm RPMS/scap-security-guide-0.1.73-1.1.noarch.rpm differ: char 225, line 1 Comparing scap-security-guide-0.1.73-1.1.noarch.rpm to scap-security-guide-0.1.73-1.1.noarch.rpm comparing the rpm tags of scap-security-guide --- old-rpm-tags +++ new-rpm-tags @@ -233,9 +233,9 @@ -/usr/share/doc/scap-security-guide/guides/ssg-opensuse-guide-standard.html 73cd921b57e2d375c4fb48b13f193916e7865bea872484d81d70aa6b2384333e 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_enhanced.html 331624a47404027351612c810c4e89ecd769446b45c835475048676378743028 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_high.html 49f5f811fe742fd2fc8c3c6e1ff07a145be5bc00152ec28d44acb6020c56fe3c 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_intermediary.html b9007b453c957b26f1537841b9baae1d647fcce1e07770d0eb5770bfb28e7029 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_minimal.html 1b4d1e4eb18ff0893716b7f31c72f12f4268408334b0c247cd70297b325b8e6f 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 08214a5a2131042321e5cb2bbbf1d4aa4bbb77b17ef791be459f732645f7fa52 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 38175231383eede007cf30a0238b722ae87df82f50a2c2a757949260a3159b5c 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html c9bbf17d8a6937601b07423f2b71de9e474fdfc623acc4f6a07b74c71726d0c9 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 7fab857cd36931f8b7f7f6cc6fa2f2a51d3aa802d7fdc1ee33a01840dd898b89 2 +/usr/share/doc/scap-security-guide/guides/ssg-opensuse-guide-standard.html 97c6c2d6877ee9c85c19293148d3b54649d522f36fea6744974b22a6f96128ba 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_enhanced.html c20f3443a688697585a05abfb6249bef801afc1f07c8fe6f1f1a673e93df386d 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_high.html 1bb6b209f8821f96a60c4af679cc6d0085ba34d5b1234cd2c843caca02a76174 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_intermediary.html 55dfe5e78ca7d69c07c8af47e49224eb392fd0dedfd48dc7b394e1699ec14065 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_minimal.html 8069aee035f5daf4b6614d43c5a3c0deee00d018912aec43eb7aed6b806c4c74 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html d2484b889535a2306d474d7391ea6e5903ff9951b23b33eabd6b886a358b8299 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html abbc4792ed91fdc7149dddfbff843d18b9ec7c659c087bc9f2705bf44a2791fc 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html 162be02be162aa29f0f1f7c9ab992aff4630cc912a60b1366721f61984011497 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 2bbe6e50f807906b53db76fa3df5340b6a6ac2fc920c82be1ba459ffa139c295 2 @@ -243,13 +243,13 @@ -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss-4.html 3f77704d85d71c9547f1c75b9a112ba6922b005759b56a67b529c0740e6575a2 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss.html 6889fe0b85785dfc7dd570d57204f7aed569697e5ca08c2ef81fd994a7e702fa 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-standard.html ed211a6bb5172e73718a5b99d1b52a1149d9b1f32c88a0820eedb480b692fa43 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html e3b3ca236cc6c09f677625453130e2fdbf73a6e79fb80295694cc10a7b875207 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_enhanced.html 1714aaaf4fb065159182e82a317662bfc1e9afc270b1b2db306ad4de39a9f281 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_high.html 4f420083e312ab8400e530d9e33e443e23b94544d611a021f95b2ca96737effa 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_intermediary.html 4b1747f42561167024628aa4a50a7cd6b43a406a0cb56e03a960c4225e80e71c 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minimal.html 556d82c93b657856c5fd1fbd7aacd052b4da47083bf3649ab7c411c614ad7755 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html f0497ade30e169e317e22f0ffed572bd92ea3eaa5a958a67459e43217b6c7749 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html e6a374aadb2dddf4192f4a2d024aa58f078f8fb3ef713ec30ca6839744e95908 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html a012e6d961cbdc8ca9219625cb1b99c4cd277c9f1e14aa6f414da3bf5ace810f 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 007036338a73d191e0764f739ddf14f4d399aef195d981eaae4a13560d46a7d2 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html 59630037a72ac473e13acc0727937d632639a9e88d374082425963d581b704bc 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss-4.html b3e6e808032805ba7c153b62c46bad87e5374d9cbadc89a3402834e2afd6bd8d 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss.html 616fec2af6dc2e30e8676046cb4b99065caca230509182e0c8cd1f4fa525570a 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-standard.html 52e6c852dcb1eebab8e9e54dcb51d638e08539bb755602070551bbbfbc71112e 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html 8d4d3eb8d6d6743f3d81a3692ab1056ca4ce7343d449b24aaee6e358ef4bd65a 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_enhanced.html fbc158500dd7ea1dcfc3308c1a9301f96f664a12f30b9193a685baf2082dd217 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_high.html 33b7eb74ba1183a2795b44a535575a340c68ea69ad3691dddf62f9675a0d027a 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_intermediary.html 138fdd53090950717ee71dd5792a56226b1ecb489ce00133677d58ecbf0bbe4f 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minimal.html eac263b65bfaff26de9e3ffd72ca1df07df5bd7b3263e92411268983e2dc24f8 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html ab7077ca3f56780f6266ad999db477e3c24c5ddf01cd944b52a42eeb2317ae7c 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html d20a43c1374c15694d727070243322ad289b3c4be040d783aeb65477853e1647 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html a49de15e88309407e216d8aed40ac7e3ca8edeb7d9b65d52043431fd744de11a 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 2f637fa24c0385eda6609dbc5e840299e8eaf07b2499065557b132cdb764440e 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html 41a8c0412710f899a3a4546538947de760deb1b3b7d0f8510e05bd29b125b297 2 @@ -257,5 +257,5 @@ -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss-4.html b3f7f33e7921087a0bf0e05c0a7cdeec9e041580dad7ed4b0c026eeedf5ac96d 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening-sap.html fdbdd4b8b4ff4d9e130a1bbb2dad3e0c2387f681c5fe2a2eec3bdedf6fcca153 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening.html 20e2b076630617b3e57bbd413e37c7a87122887dc8e78f3bb93dbda08abf12bf 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 863397abde4b23c3f751ab837fc72dc98a659b9d78ef1c511ad042b51a425c15 2 -/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 2ddfb1aa6ccd25b22e7bd2a9739d17680c0724da6ddddffbe07cc05c6afe25e3 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss-4.html 415d4d3fef79874f83e65a5bcf0190f5d8a873ffe709b41cc3d1fbf52b221a3b 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening-sap.html ec48c7a3367be94ba64f3145d429902c28e0a845d90b315de83389006a867ff3 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening.html aa617fb066248125164c74237aadda650f5e676f4793cb9c18194f359356b490 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 2f7c32719af93e20309b2cdc506349c43a4b2b5ccd6e0f1d48e1f8d51473bb5c 2 +/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 8b578ae79db9116fcf4561a47872faec59441b00ff6c5610bda711154505f195 2 @@ -335,2 +335,2 @@ -/usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml f916a54fe4c89e2bbd95047c2bfb6ae1b1a5e805743bb134588ddfdf36e5c243 0 -/usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 206a10ccc8f0e4ca7e278ec23222420e733ec79ed0af0348a765c74809a664d0 0 +/usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml 53b1dae0ba5fa1820e022890d747f0170b055eaa441d3fc9bd608f433aeaa3bf 0 +/usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml c7d7343dc2a40156070a699cdca8fac2d4e4b52f4eb56dc884e4b72bc0f51ebe 0 @@ -339 +339 @@ -/usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 15108b7f519648e7d27b9c3c9a62db38dd95cbf1c6c441f2d7ce9c149951d5b4 0 +/usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml b85a0a381ea4acad763d0918f6a3a147a37f105d9b7afa0a841664b0d4586854 0 @@ -342,2 +342,2 @@ -/usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml f9dd2c3db7c7d8a5402b664cd9e9eb6ce6e25ac46ae60aac23b352ca2e40d43d 0 -/usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 72b2f6d7d7e0e565fe3d58988e9aa02313aae5522aa3665f3d8ef522a7868ba8 0 +/usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml a0b6d386920f00cb41f527a1e4432b2dca047a6e0b55ad41e34293efb28cf05b 0 +/usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 6a05563e514bb47a956967becb8477c264cf47f31b9276e0a8a93b1462817b4b 0 @@ -346 +346 @@ -/usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml 2f7a4da9ba0d02689794c4646cfb9c34b27511873afcead4df0a24f718909ab5 0 +/usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml d1c13e7a5953f6db3d6e9d5015f2b2d16625d13d3b91749173ee37158aa29940 0 @@ -349,2 +349,2 @@ -/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 3314c9de4da2c94d39cdccade2704667b39a860ffe2d454b53fbbc4567a9eb84 0 -/usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml 8334e9a7ff1e39021ec75ebe2d5811ffcedf1c4478451707dcb67c2f870a0824 0 +/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 643c4804475ffb98dc1104bfbcc7a042368e7d1ea1134f7ea2e07aeef5691c24 0 +/usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml 814a4a04cc9320c03a43420aa7660448d18df1ce154af70476aaeefda540091d 0 @@ -353 +353 @@ -/usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml 9f0d79b4b734cb8b503e690b44a8c3cd8bfd5b14097dc5a471190fca2837100f 0 +/usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml b7ac4f1aaac3b5cfe2b83da911e854da0701b02d675680beacdfcd8338e49ffe 0 comparing rpmtags comparing RELEASE comparing PROVIDES comparing scripts comparing filelist comparing file checksum creating rename script RPM file checksum differs. Extracting packages /usr/share/doc/scap-security-guide/guides/ssg-opensuse-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-opensuse-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-opensuse-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleStandard System Security Profile for openSUSE
Profile IDxccdf_org.ssgproject.content_profile_standard

CPE Platforms

  • cpe:/o:opensuse:leap:15.0
  • cpe:/o:opensuse:leap:42.1
  • cpe:/o:opensuse:leap:42.2
  • cpe:/o:opensuse:leap:42.3

Revision History

Current version: 0.1.73

Table of Contents

  1. System Settings
    1. File Permissions and Masks

Checklist

Group   Guide to the Secure Configuration of openSUSE   Group contains 4 groups and 3 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (enhanced)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Configure Syslog
    5. Network Configuration and Firewalls
    6. File Permissions and Masks
    7. SELinux
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Network Time Protocol
    4. Obsolete Services
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 72 groups and 314 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (high)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Kernel Configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
    8. SELinux
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Network Time Protocol
    4. Obsolete Services
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 73 groups and 368 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (intermediary)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Network Configuration and Firewalls
    5. File Permissions and Masks
    6. SELinux
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Network Time Protocol
    4. Obsolete Services
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 60 groups and 222 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (minimal)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. File Permissions and Masks
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Obsolete Services

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 25 groups and 43 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 12 Benchmark for Level 2 - Server
Profile IDxccdf_org.ssgproject.content_profile_cis

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. FTP Server
    6. Web Server
    7. IMAP and POP3 Server
    8. LDAP
    9. Mail Server Software
    10. NFS and RPC
    11. Network Time Protocol
    12. Obsolete Services
    13. Print Support
    14. Proxy Server
    15. Samba(SMB) Microsoft Windows File Sharing Server
    16. SNMP Server
    17. SSH Server
    18. X Window System
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 112 groups and 356 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 12 Benchmark for Level 1 - Server
Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. FTP Server
    6. Web Server
    7. IMAP and POP3 Server
    8. LDAP
    9. Mail Server Software
    10. NFS and RPC
    11. Network Time Protocol
    12. Obsolete Services
    13. Print Support
    14. Proxy Server
    15. Samba(SMB) Microsoft Windows File Sharing Server
    16. SNMP Server
    17. SSH Server
    18. X Window System

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 100 groups and 284 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 12 Benchmark for Level 1 - Workstation
Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Cron and At Daemons
    2. DHCP
    3. DNS Server
    4. FTP Server
    5. Web Server
    6. IMAP and POP3 Server
    7. LDAP
    8. Mail Server Software
    9. NFS and RPC
    10. Network Time Protocol
    11. Obsolete Services
    12. Proxy Server
    13. Samba(SMB) Microsoft Windows File Sharing Server
    14. SNMP Server
    15. SSH Server

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 93 groups and 275 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 12 Benchmark Level 2 - Workstation
Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. FTP Server
    6. Web Server
    7. IMAP and POP3 Server
    8. LDAP
    9. Mail Server Software
    10. NFS and RPC
    11. Network Time Protocol
    12. Obsolete Services
    13. Proxy Server
    14. Samba(SMB) Microsoft Windows File Sharing Server
    15. SNMP Server
    16. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 109 groups and 352 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss-4.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss-4.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss-4.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitlePCI-DSS v4 Control Baseline for SUSE Linux enterprise 12
Profile IDxccdf_org.ssgproject.content_profile_pci-dss-4

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Configure Syslog
    5. Network Configuration and Firewalls
    6. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. Web Server
    6. LDAP
    7. NFS and RPC
    8. Network Time Protocol
    9. Obsolete Services
    10. Print Support
    11. Samba(SMB) Microsoft Windows File Sharing Server
    12. SNMP Server
    13. SSH Server
    14. System Security Services Daemon
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 89 groups and 214 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitlePCI-DSS v3.2.1 Control Baseline for SUSE Linux enterprise 12
Profile IDxccdf_org.ssgproject.content_profile_pci-dss

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Configure Syslog
    5. Network Configuration and Firewalls
    6. File Permissions and Masks
  2. Services
    1. Network Time Protocol
    2. SSH Server
    3. System Security Services Daemon
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 61 groups and 151 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleStandard System Security Profile for SUSE Linux Enterprise 12
Profile IDxccdf_org.ssgproject.content_profile_standard

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. File Permissions and Masks

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 4 groups and 3 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleDISA STIG for SUSE Linux Enterprise 12
Profile IDxccdf_org.ssgproject.content_profile_stig

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:12
  • cpe:/o:suse:linux_enterprise_server:12

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Base Services
    2. FTP Server
    3. Mail Server Software
    4. NFS and RPC
    5. Network Time Protocol
    6. Obsolete Services
    7. SSH Server
    8. System Security Services Daemon
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 12   Group contains 85 groups and 243 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (enhanced)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Configure Syslog
    5. Network Configuration and Firewalls
    6. File Permissions and Masks
    7. SELinux
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Network Time Protocol
    4. Obsolete Services
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 72 groups and 313 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (high)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Kernel Configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
    8. SELinux
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Network Time Protocol
    4. Obsolete Services
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 73 groups and 366 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (intermediary)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Network Configuration and Firewalls
    5. File Permissions and Masks
    6. SELinux
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Network Time Protocol
    4. Obsolete Services
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 60 groups and 221 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleANSSI-BP-028 (minimal)
Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. File Permissions and Masks
  2. Services
    1. DHCP
    2. Mail Server Software
    3. Obsolete Services

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 25 groups and 43 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 15 Benchmark for Level 2 - Server
Profile IDxccdf_org.ssgproject.content_profile_cis

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. FTP Server
    6. Web Server
    7. IMAP and POP3 Server
    8. LDAP
    9. Mail Server Software
    10. NFS and RPC
    11. Network Time Protocol
    12. Obsolete Services
    13. Print Support
    14. Proxy Server
    15. Samba(SMB) Microsoft Windows File Sharing Server
    16. SNMP Server
    17. SSH Server
    18. X Window System
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 116 groups and 378 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 15 Benchmark for Level 1 - Server
Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. FTP Server
    6. Web Server
    7. IMAP and POP3 Server
    8. LDAP
    9. Mail Server Software
    10. NFS and RPC
    11. Network Time Protocol
    12. Obsolete Services
    13. Print Support
    14. Proxy Server
    15. Samba(SMB) Microsoft Windows File Sharing Server
    16. SNMP Server
    17. SSH Server
    18. X Window System

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 104 groups and 305 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 15 Benchmark for Level 1 - Workstation
Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Cron and At Daemons
    2. DHCP
    3. DNS Server
    4. FTP Server
    5. Web Server
    6. IMAP and POP3 Server
    7. LDAP
    8. Mail Server Software
    9. NFS and RPC
    10. Network Time Protocol
    11. Obsolete Services
    12. Proxy Server
    13. Samba(SMB) Microsoft Windows File Sharing Server
    14. SNMP Server
    15. SSH Server

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 97 groups and 296 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleCIS SUSE Linux Enterprise 15 Benchmark Level 2 - Workstation
Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. DNS Server
    5. FTP Server
    6. Web Server
    7. IMAP and POP3 Server
    8. LDAP
    9. Mail Server Software
    10. NFS and RPC
    11. Network Time Protocol
    12. Obsolete Services
    13. Proxy Server
    14. Samba(SMB) Microsoft Windows File Sharing Server
    15. SNMP Server
    16. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 113 groups and 374 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -73,7 +73,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
Profile IDxccdf_org.ssgproject.content_profile_hipaa

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Configure Syslog
    5. Network Configuration and Firewalls
    6. File Permissions and Masks
    7. SELinux
  2. Services
    1. Base Services
    2. Cron and At Daemons
    3. NFS and RPC
    4. Obsolete Services
    5. Network Routing
    6. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 54 groups and 140 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss-4.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss-4.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss-4.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitlePCI-DSS v4 Control Baseline for SUSE Linux enterprise 15
Profile IDxccdf_org.ssgproject.content_profile_pci-dss-4

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. GRUB2 bootloader configuration
    4. Configure Syslog
    5. Network Configuration and Firewalls
    6. File Permissions and Masks
    7. SELinux
  2. Services
    1. Avahi Server
    2. Cron and At Daemons
    3. DHCP
    4. Mail Server Software
    5. NFS and RPC
    6. Network Time Protocol
    7. Obsolete Services
    8. SNMP Server
    9. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 85 groups and 251 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening-sap.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening-sap.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening-sap.html 2024-05-31 07:52:34.000000000 +0000 @@ -68,7 +68,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleHardening for Public Cloud Image of SUSE Linux Enterprise Server (SLES) for SAP Applications 15
Profile IDxccdf_org.ssgproject.content_profile_pcs-hardening-sap

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. Configure Syslog
    4. Network Configuration and Firewalls
    5. File Permissions and Masks
  2. Services
    1. Cron and At Daemons
    2. NFS and RPC
    3. Network Time Protocol
    4. SNMP Server
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 67 groups and 202 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pcs-hardening.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitlePublic Cloud Hardening for SUSE Linux Enterprise 15
Profile IDxccdf_org.ssgproject.content_profile_pcs-hardening

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. Configure Syslog
    4. Network Configuration and Firewalls
    5. File Permissions and Masks
  2. Services
    1. Cron and At Daemons
    2. Network Time Protocol
    3. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 51 groups and 162 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -68,7 +68,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleStandard System Security Profile for SUSE Linux Enterprise 15
Profile IDxccdf_org.ssgproject.content_profile_standard

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. Configure Syslog
    4. Network Configuration and Firewalls
    5. File Permissions and Masks
  2. Services
    1. Cron and At Daemons
    2. Deprecated services
    3. Web Server
    4. Network Time Protocol
    5. SSH Server
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 44 groups and 110 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleDISA STIG for SUSE Linux Enterprise 15
Profile IDxccdf_org.ssgproject.content_profile_stig

CPE Platforms

  • cpe:/o:suse:linux_enterprise_desktop:15
  • cpe:/o:suse:linux_enterprise_server:15

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Account and Access Control
    3. AppArmor
    4. GRUB2 bootloader configuration
    5. Configure Syslog
    6. Network Configuration and Firewalls
    7. File Permissions and Masks
  2. Services
    1. Base Services
    2. FTP Server
    3. Mail Server Software
    4. NFS and RPC
    5. Network Time Protocol
    6. Obsolete Services
    7. SSH Server
    8. System Security Services Daemon
  3. System Accounting with auditd
    1. Configure auditd Rules for Comprehensive Auditing
    2. Configure auditd Data Retention

Checklist

Group   Guide to the Secure Configuration of SUSE Linux Enterprise 15   Group contains 86 groups and 245 rules
Group   /usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -45,7 +45,7 @@ - draft + draft Guide to the Secure Configuration of openSUSE This guide presents a catalog of security-relevant configuration settings for openSUSE. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -45,7 +45,7 @@ - draft + draft Guide to the Secure Configuration of openSUSE This guide presents a catalog of security-relevant configuration settings for openSUSE. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of openSUSE This guide presents a catalog of security-relevant configuration settings for openSUSE. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -37,7 +37,7 @@ - draft + draft Guide to the Secure Configuration of SUSE Linux Enterprise 12 This guide presents a catalog of security-relevant configuration settings for SUSE Linux Enterprise 12. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -39,7 +39,7 @@ - draft + draft Guide to the Secure Configuration of SUSE Linux Enterprise 12 This guide presents a catalog of security-relevant configuration settings for SUSE Linux Enterprise 12. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of SUSE Linux Enterprise 12 This guide presents a catalog of security-relevant configuration settings for SUSE Linux Enterprise 12. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -37,7 +37,7 @@ - draft + draft Guide to the Secure Configuration of SUSE Linux Enterprise 15 This guide presents a catalog of security-relevant configuration settings for SUSE Linux Enterprise 15. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -39,7 +39,7 @@ - draft + draft Guide to the Secure Configuration of SUSE Linux Enterprise 15 This guide presents a catalog of security-relevant configuration settings for SUSE Linux Enterprise 15. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of SUSE Linux Enterprise 15 This guide presents a catalog of security-relevant configuration settings for SUSE Linux Enterprise 15. It is a rendering of RPMS.2017/scap-security-guide-debian-0.1.73-1.1.noarch.rpm RPMS/scap-security-guide-debian-0.1.73-1.1.noarch.rpm differ: char 225, line 1 Comparing scap-security-guide-debian-0.1.73-1.1.noarch.rpm to scap-security-guide-debian-0.1.73-1.1.noarch.rpm comparing the rpm tags of scap-security-guide-debian --- old-rpm-tags +++ new-rpm-tags @@ -177,4 +177,4 @@ -/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html cbd606995fcefd4d43c7c6bc1065683365c74fa9aaf5990ee3dc48e8d721a02f 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html d2937d5861534f17727bb7d527ac4ec757403c5a33b670ee63018d8c59144ea1 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html e3678af63569c90ec63cb8478f48251f5cef75663d397a4ba448c38d4c58ffeb 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html 438f105287637cfc3b440dd3a7fb85a116e796ca14bdf350513824571b1a4999 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html 5fa4452a770ded212b92be8d2996773919abbc9c7e5e3b9ac2c008c5545c806d 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html 4a0f75b05cac7385bd75dbf2ff7677ea05d5a2230372ac41774ed84b503e3911 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html 46a26864300cda32f212e2f2ac7bd741d4325408173e46aa1b6bf9d0cdccd0c5 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html 506bef37b38cb0dd75df5e7a8a6faa3a644e15a547f4717e064b594bc13fa439 2 @@ -182,5 +182,5 @@ -/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html 707262d864168b9fba541cebb312854b37ec06e87af72b74ee3be03e7e3dfa43 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html 2ff84770fe8e0bcce0649e882f943ac8ffb73f62bd93f78a61899b88f1caa7cb 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html b6a2341e79037a3d768a65e14bb02de5613c578b4fc4eb7c949fd4b79cbb1365 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html 32ca08122a61cbf14311aba3880cd2d66b294ab1851a92cdf2ebe35f925c4951 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html 35a38b78ae3be96c90d265e0e0a8bb1bb26c0b8abe76874e3a26bcb8016829aa 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html e50af47676590ceb892e159741ae6b90a57e8ff6bb1ec275fbe26ce37086d2e6 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html 4be1c2627007c26d286741ec98da89b0cbdda3ca44b3b8cb34a934a2839d386f 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html e8df8afe824364ffcac098ad8f60cc55e2961d4ceadc9e8eeb20dd712d446219 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html a0d3c1b7beb90d74d004a150273cab22dfec1eac8b8aa9e7b04a2f5543c6fa91 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html f3ff538b7207763294cca00cb657631802974e66f2a8a471a248f7227f392b72 2 @@ -188,9 +188,9 @@ -/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html 806a66f0c862b6d994315987eb711252a3787b2a7a50ae6a10bc657cf343d014 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_enhanced.html d950e35587e99abc2e1a3a127fb47e5e05007c86b5e2e25fb597fc0185d9fbfd 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_high.html d28aaf9b8fc57b6a47037397e8bf7224bb2dcd1e15d6fc567022c4d160300597 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_intermediary.html e2bb5b5fc9ab165a004f16f33b0c64f107278c34d42625f83c352f36d77f6b9d 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_minimal.html c8f80aab451b25830060887eaee35b6bc3413ff0e633bccc2d6e91db303bbe81 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_average.html db3b444fd153b84c8920b85f70c0afe6730ec549e60959bee2a83557f74a4083 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_high.html c32296759bed017ec3e984695ce341e4723b96f41473cabf6d3daacfe6256c48 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_minimal.html b50cf16ecc9896c79084f9fec777570af7674fea9740fe483cea5ed49a538f62 2 -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_restrictive.html 9c406db063e0e905426b42e5ffdcf637a1f64738d8b6bbb6b5c9c5b4de3167b8 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html 3f394bf5409598b573dd2b7797fe4cb81f18adce20bd50e6efccd212c56fec8b 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_enhanced.html 22f10325dcf0f7ee365f8fd2cd5617362218742f13ed40758e5c10d65e20714f 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_high.html 71152f87170f43b70e2ae475e39850fb14dcc4da06778f53bb3dc5cd07dfbed5 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_intermediary.html d9f777141b27c9e1d691007b1a5d18999cd6402f9a3415293bd7309d575dc69d 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_minimal.html ecaed61ef180dcdb2941ccf91ca4d21597190a3d3e2fececd4d4de621dac4677 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_average.html 7fa9df246a0158a64e399bed2804e641ff89de8d81ce1dcf26b77129830a1352 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_high.html e05ae3a8b10f23fc3b592d837ed28c6aa1cda7f8b7c05f000c6687f68049fd2c 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_minimal.html 9903dcf91b5ec94507ab6fe5f04778953f0c6cb0475b70d3b3b482c153f48b96 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_restrictive.html 4ac27118bd3e76bb8bb63e63b16ad8b33dec392928e8f3ef995cac26f1e70f5a 2 @@ -198 +198 @@ -/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-standard.html 5f856ac489afe1276a1094d68995934a63309f2b79ddd3cf86c67d3423e6d0b3 2 +/usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-standard.html 379b9cd503942a740869dbeb2466d32e9b052c6442e7485daf3ece9239e591ba 2 @@ -249,2 +249,2 @@ -/usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 85a55beb3bfa9f64e63f278764c437fd3d8675171f17a54efcd0ec67b0d82e27 0 -/usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml f757720b22203e2ae520931c95998f285ff00f10c8d082c64e02d5d33a7c104f 0 +/usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 4e5f2cbc4c22b52988b443c6ddb181deb444e1b693fb667ec23c869604b248d8 0 +/usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml aec4cd3f620fb696a610bd746f5de1484876958e491ea8bcf9024d03a7fa7b80 0 @@ -253 +253 @@ -/usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml f55301bd614bfd18b1ac79883854d4a073bf385c1d430ad9425e216fad283ea3 0 +/usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml 11aac12ee85789197664e8fae53adcae9e10a8abc74b429e9d05bbd16c5b4045 0 @@ -256,2 +256,2 @@ -/usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml 206cde9148aa4ae194b8279e97a3d70495ef3ac513a9b631086bf7627b2ef5f6 0 -/usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 1168471cf94747b0d334f79f243ff93bf41f65ee5788e2c5a493d1b2d985e513 0 +/usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml 8c85aef36b13c8a816c69f870e6079565009ba7a1b977120bad7b4f81079044e 0 +/usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 3a83e083c036750bc15ed0c870a3e8c8349cddd62bdbf9f35a772ecacd6808f4 0 @@ -260 +260 @@ -/usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 15f872aaa6beefe2f6db5e53c320a8be3d257ce0312ff16ac99ba39c8f627a4c 0 +/usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 47ec5bbed402c0c28f5eda55e33919b630405c4781b49e54ed112a68a6a481af 0 @@ -263,2 +263,2 @@ -/usr/share/xml/scap/ssg/content/ssg-debian12-ds-1.2.xml d70f15977da618d08a9999229e1181c1ba80ee97fc1535c977a2ae409c4b7b39 0 -/usr/share/xml/scap/ssg/content/ssg-debian12-ds.xml 32e9dc87993c7181b25787b986f238f77ac11a2c379090eefce11ed8d8edb325 0 +/usr/share/xml/scap/ssg/content/ssg-debian12-ds-1.2.xml 9d49e7eddca7712dff01083c601c4fe78fa39ca61b254a00c9a06320075f4a10 0 +/usr/share/xml/scap/ssg/content/ssg-debian12-ds.xml f928a36de031f9dde2e1130036eefb2a60508f1cd1818227368ce2cc4ba92979 0 @@ -267 +267 @@ -/usr/share/xml/scap/ssg/content/ssg-debian12-xccdf.xml 289d7b34255931fb372fc5ed507e6eb0c1b922888d9023b13c73dbda6e3addcf 0 +/usr/share/xml/scap/ssg/content/ssg-debian12-xccdf.xml 5e1e5a85c16eb97a872d445a90562922bbf09a91410a4fe8c67b291b1908330c 0 comparing rpmtags comparing RELEASE comparing PROVIDES comparing scripts comparing filelist comparing file checksum creating rename script RPM file checksum differs. Extracting packages /usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleProfile for ANSSI DAT-NT28 Average (Intermediate) Level
Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_average

CPE Platforms

  • cpe:/o:debian:debian_linux:10

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. Configure Syslog
    3. File Permissions and Masks
  2. Services
    1. APT service configuration
    2. Deprecated services
    3. Network Time Protocol
    4. SSH Server

Checklist

Group   Guide to the Secure Configuration of Debian 10   Group contains 20 groups and 45 rules
Group   /usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

Profile Information

Profile TitleProfile for ANSSI DAT-NT28 High (Enforced) Level
Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_high

CPE Platforms

  • cpe:/o:debian:debian_linux:10

Revision History

Current version: 0.1.73

  • draft - (as of 2024-06-03) + (as of 2040-07-06)

Table of Contents

  1. System Settings
    1. Installing and Maintaining Software
    2. GRUB2 bootloader configuration
    3. Configure Syslog
    4. File Permissions and Masks
  2. Services
    1. APT service configuration
    2. Cron and At Daemons
    3. Deprecated services
    4. Network Time Protocol
    5. SSH Server
  3. System Accounting with auditd

    Checklist

    Group   Guide to the Secure Configuration of Debian 10   Group contains 23 groups and 50 rules
    Group   /usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

    Profile Information

    Profile TitleProfile for ANSSI DAT-NT28 Minimal Level
    Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_minimal

    CPE Platforms

    • cpe:/o:debian:debian_linux:10

    Revision History

    Current version: 0.1.73

    • draft - (as of 2024-06-03) + (as of 2040-07-06)

    Table of Contents

    1. System Settings
      1. Installing and Maintaining Software
      2. Configure Syslog
      3. File Permissions and Masks
    2. Services
      1. APT service configuration
      2. Deprecated services

    Checklist

    Group   Guide to the Secure Configuration of Debian 10   Group contains 11 groups and 24 rules
    Group   /usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

    Profile Information

    Profile TitleProfile for ANSSI DAT-NT28 Restrictive Level
    Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_restrictive

    CPE Platforms

    • cpe:/o:debian:debian_linux:10

    Revision History

    Current version: 0.1.73

    • draft - (as of 2024-06-03) + (as of 2040-07-06)

    Table of Contents

    1. System Settings
      1. Installing and Maintaining Software
      2. Configure Syslog
      3. File Permissions and Masks
    2. Services
      1. APT service configuration
      2. Cron and At Daemons
      3. Deprecated services
      4. Network Time Protocol
      5. SSH Server
    3. System Accounting with auditd

      Checklist

      Group   Guide to the Secure Configuration of Debian 10   Group contains 22 groups and 49 rules
      Group   /usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

      Profile Information

      Profile TitleStandard System Security Profile for Debian 10
      Profile IDxccdf_org.ssgproject.content_profile_standard

      CPE Platforms

      • cpe:/o:debian:debian_linux:10

      Revision History

      Current version: 0.1.73

      • draft - (as of 2024-06-03) + (as of 2040-07-06)

      Table of Contents

      1. System Settings
        1. Installing and Maintaining Software
        2. Configure Syslog
        3. File Permissions and Masks
      2. Services
        1. Cron and At Daemons
        2. Deprecated services
        3. Network Time Protocol
        4. SSH Server
      3. System Accounting with auditd

        Checklist

        Group   Guide to the Secure Configuration of Debian 10   Group contains 19 groups and 44 rules
        Group   /usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

        Profile Information

        Profile TitleProfile for ANSSI DAT-NT28 Average (Intermediate) Level
        Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_average

        CPE Platforms

        • cpe:/o:debian:debian_linux:11

        Revision History

        Current version: 0.1.73

        • draft - (as of 2024-06-03) + (as of 2040-07-06)

        Table of Contents

        1. System Settings
          1. Installing and Maintaining Software
          2. Configure Syslog
          3. File Permissions and Masks
        2. Services
          1. APT service configuration
          2. Deprecated services
          3. Network Time Protocol
          4. SSH Server

        Checklist

        Group   Guide to the Secure Configuration of Debian 11   Group contains 20 groups and 45 rules
        Group   /usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

        Profile Information

        Profile TitleProfile for ANSSI DAT-NT28 High (Enforced) Level
        Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_high

        CPE Platforms

        • cpe:/o:debian:debian_linux:11

        Revision History

        Current version: 0.1.73

        • draft - (as of 2024-06-03) + (as of 2040-07-06)

        Table of Contents

        1. System Settings
          1. Installing and Maintaining Software
          2. GRUB2 bootloader configuration
          3. Configure Syslog
          4. File Permissions and Masks
        2. Services
          1. APT service configuration
          2. Cron and At Daemons
          3. Deprecated services
          4. Network Time Protocol
          5. SSH Server
        3. System Accounting with auditd

          Checklist

          Group   Guide to the Secure Configuration of Debian 11   Group contains 23 groups and 50 rules
          Group   /usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

          Profile Information

          Profile TitleProfile for ANSSI DAT-NT28 Minimal Level
          Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_minimal

          CPE Platforms

          • cpe:/o:debian:debian_linux:11

          Revision History

          Current version: 0.1.73

          • draft - (as of 2024-06-03) + (as of 2040-07-06)

          Table of Contents

          1. System Settings
            1. Installing and Maintaining Software
            2. Configure Syslog
            3. File Permissions and Masks
          2. Services
            1. APT service configuration
            2. Deprecated services

          Checklist

          Group   Guide to the Secure Configuration of Debian 11   Group contains 11 groups and 24 rules
          Group   /usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

          Profile Information

          Profile TitleProfile for ANSSI DAT-NT28 Restrictive Level
          Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_restrictive

          CPE Platforms

          • cpe:/o:debian:debian_linux:11

          Revision History

          Current version: 0.1.73

          • draft - (as of 2024-06-03) + (as of 2040-07-06)

          Table of Contents

          1. System Settings
            1. Installing and Maintaining Software
            2. Configure Syslog
            3. File Permissions and Masks
          2. Services
            1. APT service configuration
            2. Cron and At Daemons
            3. Deprecated services
            4. Network Time Protocol
            5. SSH Server
          3. System Accounting with auditd

            Checklist

            Group   Guide to the Secure Configuration of Debian 11   Group contains 22 groups and 49 rules
            Group   /usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

            Profile Information

            Profile TitleStandard System Security Profile for Debian 11
            Profile IDxccdf_org.ssgproject.content_profile_standard

            CPE Platforms

            • cpe:/o:debian:debian_linux:11

            Revision History

            Current version: 0.1.73

            • draft - (as of 2024-06-03) + (as of 2040-07-06)

            Table of Contents

            1. System Settings
              1. Installing and Maintaining Software
              2. Configure Syslog
              3. File Permissions and Masks
            2. Services
              1. Cron and At Daemons
              2. Deprecated services
              3. Network Time Protocol
              4. SSH Server
            3. System Accounting with auditd

              Checklist

              Group   Guide to the Secure Configuration of Debian 11   Group contains 19 groups and 44 rules
              Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

              Profile Information

              Profile TitleANSSI-BP-028 (enhanced)
              Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

              CPE Platforms

              • cpe:/o:debian:debian_linux:12

              Revision History

              Current version: 0.1.73

              • draft - (as of 2024-06-03) + (as of 2040-07-06)

              Table of Contents

              1. System Settings
                1. Installing and Maintaining Software
                2. Account and Access Control
                3. AppArmor
                4. GRUB2 bootloader configuration
                5. Configure Syslog
                6. Network Configuration and Firewalls
                7. File Permissions and Masks
                8. SELinux
              2. Services
                1. Mail Server Software
                2. Network Time Protocol
                3. SSH Server
              3. System Accounting with auditd
                1. Configure auditd Rules for Comprehensive Auditing

              Checklist

              Group   Guide to the Secure Configuration of Debian 12   Group contains 54 groups and 190 rules
              Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

              Profile Information

              Profile TitleANSSI-BP-028 (high)
              Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

              CPE Platforms

              • cpe:/o:debian:debian_linux:12

              Revision History

              Current version: 0.1.73

              • draft - (as of 2024-06-03) + (as of 2040-07-06)

              Table of Contents

              1. System Settings
                1. Installing and Maintaining Software
                2. Account and Access Control
                3. AppArmor
                4. GRUB2 bootloader configuration
                5. Kernel Configuration
                6. Configure Syslog
                7. Network Configuration and Firewalls
                8. File Permissions and Masks
                9. SELinux
              2. Services
                1. Mail Server Software
                2. Network Time Protocol
                3. SSH Server
              3. System Accounting with auditd
                1. Configure auditd Rules for Comprehensive Auditing

              Checklist

              Group   Guide to the Secure Configuration of Debian 12   Group contains 55 groups and 231 rules
              Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

              Profile Information

              Profile TitleANSSI-BP-028 (intermediary)
              Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

              CPE Platforms

              • cpe:/o:debian:debian_linux:12

              Revision History

              Current version: 0.1.73

              • draft - (as of 2024-06-03) + (as of 2040-07-06)

              Table of Contents

              1. System Settings
                1. Installing and Maintaining Software
                2. Account and Access Control
                3. GRUB2 bootloader configuration
                4. Network Configuration and Firewalls
                5. File Permissions and Masks
                6. SELinux
              2. Services
                1. Mail Server Software
                2. Network Time Protocol
                3. SSH Server
              3. System Accounting with auditd

                Checklist

                Group   Guide to the Secure Configuration of Debian 12   Group contains 38 groups and 113 rules
                Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                Profile Information

                Profile TitleANSSI-BP-028 (minimal)
                Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                CPE Platforms

                • cpe:/o:debian:debian_linux:12

                Revision History

                Current version: 0.1.73

                • draft - (as of 2024-06-03) + (as of 2040-07-06)

                Table of Contents

                1. System Settings
                  1. Account and Access Control
                  2. File Permissions and Masks

                Checklist

                Group   Guide to the Secure Configuration of Debian 12   Group contains 9 groups and 5 rules
                Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_average.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                Profile Information

                Profile TitleProfile for ANSSI DAT-NT28 Average (Intermediate) Level
                Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_average

                CPE Platforms

                • cpe:/o:debian:debian_linux:12

                Revision History

                Current version: 0.1.73

                • draft - (as of 2024-06-03) + (as of 2040-07-06)

                Table of Contents

                1. System Settings
                  1. Installing and Maintaining Software
                  2. Configure Syslog
                  3. File Permissions and Masks
                2. Services
                  1. APT service configuration
                  2. Deprecated services
                  3. Network Time Protocol
                  4. SSH Server

                Checklist

                Group   Guide to the Secure Configuration of Debian 12   Group contains 20 groups and 45 rules
                Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                Profile Information

                Profile TitleProfile for ANSSI DAT-NT28 High (Enforced) Level
                Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_high

                CPE Platforms

                • cpe:/o:debian:debian_linux:12

                Revision History

                Current version: 0.1.73

                • draft - (as of 2024-06-03) + (as of 2040-07-06)

                Table of Contents

                1. System Settings
                  1. Installing and Maintaining Software
                  2. GRUB2 bootloader configuration
                  3. Configure Syslog
                  4. File Permissions and Masks
                2. Services
                  1. APT service configuration
                  2. Cron and At Daemons
                  3. Deprecated services
                  4. Network Time Protocol
                  5. SSH Server
                3. System Accounting with auditd

                  Checklist

                  Group   Guide to the Secure Configuration of Debian 12   Group contains 23 groups and 50 rules
                  Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                  Profile Information

                  Profile TitleProfile for ANSSI DAT-NT28 Minimal Level
                  Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_minimal

                  CPE Platforms

                  • cpe:/o:debian:debian_linux:12

                  Revision History

                  Current version: 0.1.73

                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                  Table of Contents

                  1. System Settings
                    1. Installing and Maintaining Software
                    2. Configure Syslog
                    3. File Permissions and Masks
                  2. Services
                    1. APT service configuration
                    2. Deprecated services

                  Checklist

                  Group   Guide to the Secure Configuration of Debian 12   Group contains 11 groups and 24 rules
                  Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_restrictive.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                  Profile Information

                  Profile TitleProfile for ANSSI DAT-NT28 Restrictive Level
                  Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_restrictive

                  CPE Platforms

                  • cpe:/o:debian:debian_linux:12

                  Revision History

                  Current version: 0.1.73

                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                  Table of Contents

                  1. System Settings
                    1. Installing and Maintaining Software
                    2. Configure Syslog
                    3. File Permissions and Masks
                  2. Services
                    1. APT service configuration
                    2. Cron and At Daemons
                    3. Deprecated services
                    4. Network Time Protocol
                    5. SSH Server
                  3. System Accounting with auditd

                    Checklist

                    Group   Guide to the Secure Configuration of Debian 12   Group contains 22 groups and 49 rules
                    Group   /usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-debian12-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                    Profile Information

                    Profile TitleStandard System Security Profile for Debian 12
                    Profile IDxccdf_org.ssgproject.content_profile_standard

                    CPE Platforms

                    • cpe:/o:debian:debian_linux:12

                    Revision History

                    Current version: 0.1.73

                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                    Table of Contents

                    1. System Settings
                      1. Installing and Maintaining Software
                      2. Configure Syslog
                      3. File Permissions and Masks
                    2. Services
                      1. Cron and At Daemons
                      2. Deprecated services
                      3. Network Time Protocol
                      4. SSH Server
                    3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Debian 12   Group contains 19 groups and 44 rules
                      Group   /usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Debian 10 This guide presents a catalog of security-relevant configuration settings for Debian 10. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Debian 10 This guide presents a catalog of security-relevant configuration settings for Debian 10. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Debian 10 This guide presents a catalog of security-relevant configuration settings for Debian 10. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Debian 11 This guide presents a catalog of security-relevant configuration settings for Debian 11. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Debian 11 This guide presents a catalog of security-relevant configuration settings for Debian 11. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Debian 11 This guide presents a catalog of security-relevant configuration settings for Debian 11. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian12-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-debian12-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian12-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Debian 12 This guide presents a catalog of security-relevant configuration settings for Debian 12. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian12-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-debian12-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian12-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Debian 12 This guide presents a catalog of security-relevant configuration settings for Debian 12. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-debian12-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-debian12-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-debian12-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Debian 12 This guide presents a catalog of security-relevant configuration settings for Debian 12. It is a rendering of RPMS.2017/scap-security-guide-redhat-0.1.73-1.1.noarch.rpm RPMS/scap-security-guide-redhat-0.1.73-1.1.noarch.rpm differ: char 225, line 1 Comparing scap-security-guide-redhat-0.1.73-1.1.noarch.rpm to scap-security-guide-redhat-0.1.73-1.1.noarch.rpm comparing the rpm tags of scap-security-guide-redhat --- old-rpm-tags +++ new-rpm-tags @@ -817,13 +817,13 @@ -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-C2S.html 955a6b25d08436a1244cd3f0790b2d371aa5205596187d38bb3d70b8025e42d7 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_enhanced.html 2a225ff382fb0556d793505aedf15326f40bc84be3bad0bddec77beb88c5a8dd 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_high.html 7d258724c9e877ad048264168ffd345b4ce62a7199f95de99d37cf5773b04db6 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_intermediary.html d7d909998e6b393e8db307589d27d9c548d9e43fcd61ddd20217706b7c58c3ec 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_minimal.html 66fdd7c1ae4b730dd38161c0b91470c478ad085ae3e65c9870f4d6bc39a7c570 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis.html c158ebf6399be05c36bd1de85cabc06bf90d46fbad6714e27ccfa1ffd00f29fa 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_server_l1.html 472a5d2647d191c3ec94c15b61a44d4783cf3da7de2e66f10cce082021f7ddb9 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l1.html 42c884e6817ef2f1c99c35875ef3086522daecadc17b5749d7af01a14f31ffcb 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l2.html ef980bff7eea01b438019885d0c062866fb2cc29f53c48f72fe53d411202b923 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cjis.html 19fc537a3c68bbaf89fc788bc277fd6a2d9108cfd2c6eda2e7f70b19ed5b2aab 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cui.html f11a07a2942c72d201cfd2c210ce007e455926851c031b46f7ff66c7eeb4e496 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-e8.html 19ba73eaebac8e25d6edd9b9c13b23524aa1cecd5b30d432b3dea11877565090 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-hipaa.html 1ae0e1561dd8ceebfd166ea87979eeacdf39dc33fab3dae19e2fb49461566de4 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-C2S.html dec250f515585e1e2eb58e623a0db5b615cfed5a2a43f9059750a7d697dd6c42 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_enhanced.html a8d93520c8acc22845b4e0452d5bd900cd6bf55ad5e8697ad506d50b880dab55 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_high.html 3f47a8b4db3af2f72c917626e2edfb767f63fd6e80a8c36ddda3b707e4a270c8 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_intermediary.html dfb7c4bc5ed3ffb0d131d30884d07ca13e2aa31f758ac344b463b4393614e5a7 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_minimal.html fbced1a9fdea631637fdba4bdb45900b210350ef16d18d4c1f603b96005e7352 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis.html 81416b769c85cc47b48f60c5b485725f1fc5981531c355a87725fd873517fc51 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_server_l1.html 0bc109763f4fc4f3feb0fbfd0f04aae3397d85100aa028e8de608b07e3dd243a 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l1.html df2d261f34a71bb0202c4c8b869a839796d60a2366271daf421f951b3e0bbf85 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l2.html 4ff225e5b517b318c634038cb3b7cc52e9c6260ffd12cdc7dbe3cdb5a413eff2 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cjis.html d0e2b7c63802926d416483960e0666b5efb19390cb75ca7bb2738af74cde151e 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cui.html 0c65c8d10bec48beaec6fc54ae2fd5a92215bc43c9af19bde080c3b96d872f2b 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-e8.html 74c532d19247fefa2547cb97fefc068a23be4090a0856044ece06e5fc93d211e 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-hipaa.html 75d9f41362a050b18be0caab655b962f69262187aa4f25c59de4400b6e4a96d2 2 @@ -831,20 +831,20 @@ -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ncp.html ad7004f9c8e70e9d636b7b02287336eac891ffa42fd3ff544a06692b802fc0cd 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ospp.html 0464c9a73dc572d53eda483170382a78c55470bbd5742ee28dced33b2def462b 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html f45e5b28acea31a799aa9b6384d02ed0fcc200ff7b809a02d342a7bb1e1f0eb3 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-stig.html 38cddb38e9cce9c1330c6a3fc97644c55c9dafac782ec1d0514de3f457799039 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-vpp.html ba7120da300d99ed6effec3719125ce295ebd972b034b1868f69d050769f5781 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rht-ccp.html fd069eaa83ccaff8adb54e8e25a81a2d754d27b240fdc93660cac881c7ecbb2f 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html 8792178fc163f930d30b900fc2be4a253f81bb5697555deb069ec436e04365ab 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig.html 813a4c9a5b27ce9cb82b9e597cc0e7d3e8c3aa77aaba34f58c1748927e5da299 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig_gui.html 5ae18313688efd306fa2165c0b8fea50950fa881ed1ae22cd30a4dee0eb09bc4 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_enhanced.html fef4180635170c0c66e3c3771430e7837020097a31ed60a26e30823aaaa368f3 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_high.html 5698fab860cf26d0f4db50053bea1e3009347ad920414a280b280818821c2de6 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_intermediary.html 5afb456914ba773c9585850a50ba9fee7cffd5b04574e28d77180ca53978a0f1 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_minimal.html c83def32b58752c1a1c733188d3ef210f09f1a8aa4fa6eeb91bd81c99be03f58 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis.html 14e61c6c5d2fba280c69aa09807e367413d54bd176a217570f424654cb1c50d5 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_server_l1.html 8ba40ba864f218c58bdad56c16df178d0612ceecc632e8a08536538fa485dee5 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l1.html cbcfd9107b4f50a218515d53298dfa5262148248efb006229ef78b6298e41b3b 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l2.html 97a67bf5a788fa4f2cf209898e3045fbddffc6d690e2314545399de49cb3b9b5 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cui.html 0f1e06d15b5419463525cd9f85c050eec335ec77043a55c20169057e10896d22 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-e8.html da6ec91a44d1255456e1c39a39c471a763d32a877ce02b51f8a86f527aee2175 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-hipaa.html b81482f7c48507f806175a1310e91634ca3bf60a7d5c8e1fcbf316bf21803afb 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ncp.html 6e18f67010a531418d9c6d83b24ff82b91177e31c7c1ffc614b9ebae3881c1d8 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ospp.html 6f6ac81420ef9921a6cdd00d60edbdf42ad4b0e40bb179a50e5054eab2561a5f 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 0bd0c20cba15d4f4ee119d3fd541ef919db1dfc2b750412233f5e8d9bb1c9ce1 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-stig.html 644868cad2794ea718139de776f8861b3cdf7c0163ed3d46030f17d856cfc997 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-vpp.html 62304fd631a09e626bdfc59a69c98858dd26c31c4e0d36b13224376825da5d29 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rht-ccp.html 65e718d399e08dc6f4c4969d7354f926a83e57d4283c5067fa2d755c2b883a75 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html dd97f83f0ccc2f0d10175c6eb8d074023a11605e1a602d28a9efbb68713b12cf 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig.html d625467a29f70eb40fdbb0055b24c1f12c41bb91bfb1227f0cd6e7848f368ba9 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig_gui.html 3533c13fcb082e12ed4a17d888040f7f7349cf0cfcb3997d30637715901d75cf 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_enhanced.html f79c7f1d97cf82b41abc907e6a5f3f7efcb7938e1a7b39136876f1ff1b10a6bd 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_high.html b84999e6f4991e7dc19385a7a25d5624bd4a33ae1fcbbc316d07a4726490000f 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_intermediary.html 598b558b2bd042b7f6dc66b80047c5efcc25440aba90b04330afba793417812b 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_minimal.html 636490b4c919a74f03b4300ee938b050a022a0ebaaf972655caef6f913dfef5f 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis.html d5c82b5dd26282b31c2f445b088cdabc1b5ba6ff165b6337b9bed0c40ded3a0b 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_server_l1.html ab770952c5e75ddd341a10f11578b0efb88a9506756655c2f06e6efe49279e66 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l1.html e06d376a4305bf504d9ef3fdc21db5d9a566cc5dd565fdd4bf889d7a2cdcf398 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l2.html 312a99a98e5be8dd164a63688ec8716ad993df11425dc82fa836b5ec2f99b071 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cui.html 5ff27a0570ccc17cc0a4989539807229ddb4962a0b6401c823ea5eacf8ddc3cc 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-e8.html 257a843b4e8f62941e5ced1088e78f32647b1013fb5e12bdfc11991656636e8f 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-hipaa.html 950d9fdb6a00cef792ebe800f564b5fd5cb388121c52cf649f6ac146a0610006 2 @@ -852,19 +852,19 @@ -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ism_o.html 17f5f9ad9435003813f8f840180fed07ecb144313fb2b3aeac89a4d402aebd6e 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ospp.html b55b3567fef49374836db78c188be465c2ef5a0b6c1728071642b4645af7fe02 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html a2df0ab92d2846559ef8a8acfb54ab76aac7e65523bb5014e3b061e2f6b894cf 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig.html c25f848e0b94efb739e3788ceb7f2ca7607a3cafb61c0bc8b153b6c0a904073c 2 -/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig_gui.html aab37c77e7991d7ec7e9a6452db02e5c32d78e39b21e2df5215c43b5e6e1b4ea 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html e56e298b51a8628802e85a1921c49e6679bfb327299320574b81769d7a3af689 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html 19ef8cfee140b7fb8daaacdbd21532631e11cab4a12d9433c2612512008635ac 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 2dfdedc0ba4b701722c7ceed9738e33a376ddf1907380cdfba2818e41be9164e 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html a84d4de45c6d1c8bcc4f61ce553758a1aedd47007fbf19faac0ebf8f2884d1e3 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_advanced.html 2cbec6a5ee596e73337e168ef60a15a28d236d9b1d1113804d3ff48c97841d97 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_basic.html 44bb6898178de55949b284304c141f2fbd3750d068855b3a07422f5cbb1d3472 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_intermediate.html ecbb92676a9b691cc64036b594cc626114b055a171e1094c60286ca047d8a8a5 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html 9545989383be62b0730f06b40442e6d818a6755da3026090996e83492c1b19d7 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html f7a6e38068dff88df5e4ffaa0930aa08fc137147c1abce0f8a2a6122d4476ccb 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html a5c63bf8e031eb81225940a3c632cf05b34015ca89721ac32481b4b002229efc 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html 6fbee2b65b9345a7dd0d154c8e7103761e54dd1ba0fbbcf46387a981212a1046 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 5432ecadbbe814f496833cdf9130a6f1838e7baf153bc1af4a893e860012ba15 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html cbc0f59a978cca124ab30b184a9b13085b622419471892f63a4bc89a7f39c810 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html 516226332dfe0e0f35daafc99bf15d45dd4ed90794325e1846c546141b01d5a5 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ism_o.html c5da6af041d7f9f07c285c6533e39d5985e770c3d827b9f56077f7c33ab1aa01 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ospp.html 03e3fcaca1b8dcd86dfcf5c5a8ca6e0d81b63ba1757f9a4e6ecbf09d259a9719 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html 3071ebf821b957ae1e037c623705d3c23341b12431bd59368eebac99ff13392c 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig.html 1d7574904251a93e17eff4367f3559b38500d547c3bda185daf7bf00d584cd01 2 +/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig_gui.html 1f0b4b87dbaefddcd8710f68efa20ccb2e64e38e4035c1afb0d8c00aa089f58c 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html c447ec6131a65e1c20c76cd098924fc74271d78170302dfceb75e5bd2ab2167f 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html 53316b7892a87a9d45d9dd56f8581e77c4e37f80be28bedc848fac81c22182fa 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 10f24a7454344c68caf50cbdb2af7369a9e047a043b4dabec3ad5bde793b454b 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html a187dac60e0500246e97da20a6fef7bd8e8f80806c76f7718360382d3c4bde93 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_advanced.html b14fce13714b77e92c1f43d42857d19fea791904c2830b2f36e24cfb02caff41 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_basic.html 65a2e6a29ecc6397916412c16dc7fb28040628a65dbc3758b86c6ea844efa58b 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_intermediate.html bd35350d76b5934662d34607b179f3e861d1b2d93f3edb0d3103677a998c5cfb 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html ab88cab7fab79941a298d70632820ff778a298d67f242a2376089d4fbf45b614 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html 55dbad9d9d30bcd52eeb256f50361ac8b65957eb5ca7cf648a0200aaefb3a13c 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html ba9d76cc2f4b701815311a8ccd6565061ce2193313b5ac6ace0b71151bf2cb02 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html b7f086f192e2518fee0403ee0c954e78c46682eec463d86a568c2d6c29292de2 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 084dd69d670653df73d71cab7a62dc9105cf46f59e2faf262cd3e1fc6349dca7 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html ac905e27afc7d0754e649196cc9ef990954cca3e27c19fd91e0a71b43048a47e 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html 38872b461b598d97ce995a8c6d164b197861f06f0357264e320e842f0200080d 2 @@ -872,6 +872,6 @@ -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html 9d49871686888d7d763a64f4957f6c570092215bc4a7b3d5241ade42d3bc56c1 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 97afd109fadf396ff32128ed2ea4e9cb7ee24af6164701c6a85cddb5c436ce8f 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 8aa2392e6d5370b91c7db68e495942a02344bbbdac9445793c296e2d25519a3d 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html 7e9914047f85cf15b6b27314ea63d0e43f2018180f3b33d42e5de52408c29784 2 -/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html 47fb4a471c43e5c45fceab570c183198ba841d5a273ba8b0c060f2e10840b46d 2 -/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-cusp_fedora.html 8a5e0dd19019a8dcdc6082f05e8b111ae4f31fe875c5c46a885f7631ef4cf3a6 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html 0960f2db362776eeb874f367e350790385faf8b1b6ac69ae8e06a9c03e70de80 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 35c07c2dd5b2bddb27704c6fc25d94a7d25c8fb28a48c7a427f0dd48ae51d3da 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 4114a9d16ca5772bf3f3a35e1a0184d94d744b4e881633627630ac2bbb519965 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html 5c1be1cc286046cedb32e35b2234d2aad49b0f41828cade066eebb847c1cf3bf 2 +/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html 831ab19b0f99826e962c186d5aa84f438ac3f02e592d175ace9ec8b9cebbefc3 2 +/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-cusp_fedora.html ef3caaeb7a1487f486f080344a13629d240f2954a41a6d02a0a349c01e5db96c 2 @@ -879,11 +879,11 @@ -/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html 3e3447aac4bbb2cf9c80aec87c44d4867ada12c18d429e4e9e0aa0013c06e7b1 2 -/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html fe5ac2756dc1d2e0c0151505468e7486978fa0b099c2fa4cadd970ec512e6555 2 -/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 2c0e8022db1d3ee0f18d3ccacb07dce893bf92da7840e30a0e2c20802253255c 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 7da2291c97991c28b6b89ecb500f1d0cf41e39ee3a17bcbfe2d5fb399d598b2c 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html 88ceb5f719317eb0a4f346251b67675b64de65fac4e8f4640de2d59223874cd7 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html cc27b32c4229d7bda014a48d2b5dbca71539852258a9c3e462cc86bcd7015db1 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html b25a867ba82bb5abe5183559942b128c7c8c50ad2a6312d720a2fb538686d218 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 7200517707be93a5406caf3c57119f902ea78b0e2551fede54deb476935af348 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html e7194f2d4f9113c76a623f9fc286b95c18d380dfc8267278239991ae9e505f40 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html bf91e535b81dc34cad6a3d1de8dbbb4899b2afc6ab4ea3bad949e540838bdf67 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 5e22f6c19f8f9c4bb8b34c90b13ad681c1d093744911deefa5abe74c1fcd4c0e 2 +/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html c4c8d2d1a32ea6fc9d574055e3c2ff15ecf6ae1c0166f0c2ded8919483dc30c0 2 +/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html 7c0f6625ef6684a02988d38ed35da34ab80bb5f8eb9f4ff9fdc7f28963a6aff0 2 +/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 01ce92e067b2f8373f9aa60efea67400f0bd8438aa99aa39cdaa42b673eda247 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 9cc0f024eafa6e0b4054dcefecbe328ecd6a13b5c7198dc74c52ee89b3d6a2c7 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html fb790819d7eb2117b1751fb832aabeb469a019805a5c8c5f592847bc12e1a4ab 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html d37f45cf720b9a74b0ddbba87f5a7e1ea4b64c883478841177140db2d4203884 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html 18203396ae04fe6d3e0f6a1b60dab0f3ef08ae3fce4384476c81857c6c44c9a1 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 77523a5a65f211c44af70a179a93b2becc95a66c07ee5cfaacda5ae916a0e069 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html a79b0378bb6d01f1c7925ac8a2c4fb60069cfd7561b92c25866a8fcf0c3207b1 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html c603f23e4b9a46832c7e4877fda4b556b40df9c9fe71000e82268aff1b31457c 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 49b5e06ae872af6c9b7dc6f944f803248d89ad16e5e9a33c4e99ccc40e18fe77 2 @@ -891,15 +891,15 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ncp.html 14ecdff009ef8cc2bcd0e15993afaab117be64c60b8c89debd953d9a0a685777 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 8ca24c9ab1f23ea1aaa65e0fe0c695c4ac813c0cba365a58868abd55fe92b009 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html a1348dac7d73717c33e3eb09e2eafcbf2968dac811406f7f5ae9ab78323b222e 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 101203f40a12e60d4741e7175a0afcbe0c5ac0ed3fdc0e9844b12a596adfe856 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 3e3f806a587da95c8a5fa04d1814c3d4a7ecb8f9d3973ed953d056bbdecb158b 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 1264199f00450ae7e0e6d891609467342e74248567a2243f67f17114ad8e879d 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 0050b666d5f2c3df2ce2335c727f1ec3e553c20eac5f5c1ac8ae9be90a23d541 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html 12119a95836992039089282038d2b085f5241bf2ab3613c4749ccbe32ad549de 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html bf30aa59876fd7879e60615e8a3e72b9205bb38509c3150edeff0bbaea2fe279 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 725782fc6bca9c7f00578a1404a311d9c6a59059fd2369b99c74eb80102e17d7 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 38cf98cdc4e0cbb649bbcd03634026f9701b906604783fb0480f4773b5ec6cf1 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html b5c76fbe62d5d7d8641049eed46abaf3e2caa237364ed0d729ed1d2d66ab79ca 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html 21d8e71e8bf924f68e20f796e421d0b7bcd130d46270b755cc1069e5ade34f26 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 675f46f70ac84596ffbd1af899df9997f1ba7c9789ddc8521b8ad3552d0471e2 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 51b358f71661cbc498b8c180a234b3fbe877fb8b01204bcf907899b8b3c8a103 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ncp.html 2e9e61719b8f8bd256d24bb31d6b019ccafd1a07bbfc8cb89006514283976a51 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 18ad7e9d86f148a9b8e56a15e1b947f6270bdba7f01bf98789a7a90d14ea7c41 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 94f96d582a43d085d7d710618e48075e0042582ec280b03ac7881a7c727d91a0 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 13fcfe3f00699e04b7e76d19566f239f6e465279e3f47f040a951c26b92b763d 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 2b9e1b02697362b9c79c0895d16d316175f15bb294fe1f57f477b47c00d7afe4 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 32cefb34897c792e0dcf5bb2c226898f200ee5c03a9616545a858c6bc1480949 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 40f606df9354e34d6e051cc7ba7c666eb5ce1907601523f552eb5f6e0258ab45 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html 01abcd4c66ab094bd5a942a628b7aba05903d59e9988c74b85c93f2c9be5ba33 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html 97cd7d1deec73677c0b2009f8b9517964b1d13580e7f7dcf42b500463072188f 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 06e0df5537a15f193c42476ba6a6a392edb413ec0ef1154eae72fc829b477552 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 049cb154dfd70c70e7eb881bf5a3ad1adb675ecc143fc688eb8ae8e3d6f33507 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html 6e4b7d11bf3be01893c8f5cb82460d298d66944026bafaceb6b510334d8dc0c4 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html 692ea40264776b7837f502dea0f22f22af477bcd9c0fad27338a9f87627c7933 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html db4cf994cbe103723e6bac9aa65559ace07b06a9285db343bb864e3f148720dc 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 425dd9920d4035e2ea2b9f88ad4170d7cc7d517046c82785e6aed20232e06fa6 2 @@ -907,12 +907,12 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html e1aedbf73a2fdfec985e3ce8b7641c2621b926eb7367b20223b6b887d46b25b8 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 9e8232cb532f216fcd67a99e72b70e254321a9f138145f6975b86c5e61182595 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html 6e4abbfd98d7b52c99da80cddca1294bfb232f00c975afd1b1f262bf5bc24657 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html ac40401cf895a26daf2c79dec7aaee7f98db2764a699e4e0473dcbd5dddc9e42 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 9c787a3cbb3a21065700053b9bd52291a7db7f3aa20197ca4912924651216521 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_enhanced.html a2fb7697f19b335977bf2f39d12692c54ec86d7c48399abfc138fa9f1a2509a6 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_high.html 2a8dfb61a80dedbc546795c025a48f0430943bd42fbf39761044edec1be7f697 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_intermediary.html e88f85d2b01db7cf5d7b7fa73632db3bc1d204b88de9e4938d276ecf45556cb0 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_minimal.html b8e3a1cf72798b516c3d9565049060ae19c3bf312b5317d1df51e0e1c8a3b521 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-cui.html 61544c7926ae92b677662bd361f2c75353d662023d0975441b50c9d5db116c66 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-e8.html 9cddce47f592928ce4cc93b2b8891d73bbec974860eea7059189103d6bbf3569 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-hipaa.html 024c16780eca2f7de5867753bca0b791c0177df0816a44f1e5241a273efe3988 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html 0358d4c6b032d1848115edab71719036614821d17f78833de8813d495e4ece4b 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 9806114341b16424648cd37af341190d74cd7594eafbbddba43bb661728fe374 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html 2b6eecad4e1f8b76b1c5bb09b9ab7d7492f2c550b6647b599cda2e7a86ab416a 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html 3895e18ace587519465139f6fd367e19f2db6ef51930346291b49d042f9040e3 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html f420fd4464bbbd469dbec7709a1566e7d827bce86a0135dcf833499298e33bf6 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_enhanced.html 80987842fb62894f1ccb04ae0066464f097ee8a0eb0d84227b93a070cf5e1d15 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_high.html bb4b3593b2fac3f3088f045c7b33500bb803f78d22df0e453271d6ceda48587d 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_intermediary.html fb2454c6707d2037096cb07eab1a4e410b5e8625b02ac766db5f00fe531f94c5 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_minimal.html 0affd0e8a871b4ff65fef5243ea13b4d0d9ec6fe6ad05e2ea0f92464783a167f 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-cui.html cfd5e0980aac7154906d1e1612b6697baa7cdbe0a06ba63865ad5386f06f1528 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-e8.html 1b76ba977fd19446c5056a42cb4c913968759df40bd175510aad4bcdffd035c1 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-hipaa.html 47835c9d81ae824493e32d966360acbb5981cf8455a8b73adcbc369db77a45f5 2 @@ -920,5 +920,5 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-ospp.html 5e146d6492c3fe63980e95cde1bab29fc8519c023827c5ef69aed7f4326f9033 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-pci-dss.html 83d2a5e5fb0401f42c4aed246c047ae422b00f6c4cf59222d87b0b47aeccdd76 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html a85f56d99d4e8772344d6767060539acdd528a2e46f4c53d390e2721e0ff1744 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig.html fdd1b498cf4cb6ff5fa69b2661de2a3ddf362c522c8c5b7d657652a13efbfe22 2 -/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig_gui.html 1f801790ee2c0159c1b2b22c7d60df4656efed901092373dbe1d133bf7310ef0 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-ospp.html 596c89bda5e97dda3d02d62b815ed0c83296695772371f2dbb2b81c8879e5b55 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-pci-dss.html e90fbf5cd9e32c2bea037f7d7d40a9d43a8b3cda0943a52b43b582c14ddac0f3 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html dd922b35e17c00b8bf1e86930e6e1478b501a928880205a11421fb65cf594e06 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig.html 56577d4eafa628a463421e1481cb8835a92286a23f15a6cda5f7f7b2a3679854 2 +/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig_gui.html 919bb786ebdb3aca76a83b5218d9e1a9054bf2e37970c2d6b8aca1699821c8c3 2 @@ -926,10 +926,10 @@ -/usr/share/doc/scap-security-guide/guides/ssg-openeuler2203-guide-standard.html b3f43054b46add04d0b15fe7f3830af182a7dfae55eb5043bdb0dda70d483f8a 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_enhanced.html afa42d255a6142e26b7633342b9c58d347fb0dfca239b8d05259b616b6576ca8 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_high.html aa0ce6a96fe7703df2c45d190ded1e26c8bb7c301ca1825c975f907ddbdd68ab 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_intermediary.html 2029516b435a273ee2aab140d3821769cd48e8bccf4d966772f2476cc1fc6f64 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_minimal.html 3c3c93cfb6c7ed8c91987730c0da6b79813c212267a98093fbf7259232d629b9 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi-2022.html a1a536c41baac765d065d857eb3f6fbdbbb46918e45013f43601b9ae2810924a 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi.html 7a4419d9292c67fc2933674a4b3543d6ed98028c9415a63093184fbb19201939 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-e8.html 0f88e02aef6aacf7f9f63360b5072dd5dec8202029899fb86ba2073f7e421702 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high-rev-4.html 3240baf06efa6e4da52ee966d29d7cabc5b78cbe2e4fd0948ae8de851c6a5436 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 4b7c51a6cf4d09f42da43bba4ccca9f8ad4ded872b44cc044d9a634903fede16 2 +/usr/share/doc/scap-security-guide/guides/ssg-openeuler2203-guide-standard.html dfa268aac4e156c582e131c1b09607046bc6de32827563f324e4c3fc7ca5a8a2 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_enhanced.html 4a91044cc7c3f66d61082573d2fb7452e1097bc526d18bace39e7b52425d3883 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_high.html ea01190813b4dddd164cf408ddecdc27974e90d496bc516002402eea79122d81 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_intermediary.html cbc47a4112f6c1c1b5b12e87c14dcf96a359566a549df6546e3f1b14c2bc2c08 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_minimal.html 4f0e26aa4d3392da0f83911e446c9c5fbb18df910feb17a81dd2902b1f90301a 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi-2022.html 50619b2096e8b0ba7aa9727866683887b8963e83a28055b663b4c48bbf84ee7e 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi.html 885063d9bc0c69aa897715d383ccc316fb51c94f559ac0dde37b6c6734021d88 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-e8.html ab3e52eeed1c6ebf46705cb77e19068a4ea7de5d64441e3fae34f3e806d5e09c 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high-rev-4.html a3f351cf57a06a0bf48bb0d66a9351d23691027045c03142082d92ebba1fcdaf 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html ac7225d783f26e6eb71d753fb0df58cd8074e979dadbe17447cf9fc83b0ebd6a 2 @@ -937,18 +937,18 @@ -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate-rev-4.html 4da37fb756fb2ccdefe981c3c4b7b622f1cfffe43ed30a33e4b25e9b99cc6c8a 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html eb01cccaff876e3c84019401a18260192c54dfcc7c0f844a022d860df36f38a4 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html 11a80a675db5308681885b4e12f1b3045f130ec436c2769646ce64cb4b9c1399 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig-v1r1.html 1c53af1d8cd312377f99f1a6d10a3396cb3021e01b3103108cd5c1cf92079fd9 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig.html 9257f5a3eb672049a1a515bb55473236c0fb9d9156e558da9e1f478fb963a602 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html 7d0746c5cf94228845f1a5284fb8d7a6cb310258ff8370bb4dc4e4fd89a21860 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html ffca62606b8bb1a23af8eaee06d0c0867442494063bdffc03e1b6b1b6190f5f1 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html a870b4c989820e9ed257d860f2d0995a7e51275794a719f0317f9c6e42d12e40 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html e7c066033b6c59c4cba0a2244ee476b9fd99d667cf8386edc78796fcc274befc 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html 827f829f02cb483ce28ecb497d4abf4e82eafe11d530a9228557df55b6e53679 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html 5ad552f5c41c8155c6aa980006377c62a818dfecf35cd4434cf528f91b263235 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html c323eacac14165f84a6b585d92b437532fbbf0be92078cb2895751623a307fbe 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 9ca866b7b2e84acc3138862205674b76e1a5ef7655f0f8c21e6552d05e3e8b54 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html e039a647031a8e64692791e599d53fc133a5949a45dcdca72850c538d716d40b 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html cb90251639cd45ea5609b44c3a402f26626b3f05095c61b68f2fbdd433d151d2 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html 29619b11df4d40bf9f83727fa0024dc7205865abd925b038e06ecca80cdda047 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html 3ffa3b8acd006e4dd3c266e2d4f0410da3b8e49e14450ef001d95bd59d4be1ce 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html 54247a9461a11639ea307de4cf9834b4736719ca4fded3f30dce958a8041c97b 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate-rev-4.html 9d0cbff687674b62437ed5c4ac75fdab2906bb436048512ea9b5abf5fcaed34e 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html 36cd4beba49aef2355ee08427bee30a9fe9e1166a797c66794bc71ccae45e126 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html cbfa6d0f5791549242f16e86f1db35ea57a38a00a7563b2ce0d77e6ad33ab529 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig-v1r1.html 646d07814423021e8c7a820a15cea89dae2ff81c5067b8f9ed597729a710aae8 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig.html e8b72cc453cdf6eb6e7205b1c5aca8d8cc61814818c35e33c250be85230b9f9b 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html 0cd7481bc34fa6ca9298d928a92f12b084592c11f512831743c2575209c87505 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html c9cccc6599fec0bf60503436c96ee18e04dfc111cc5f7f353ebda9e3a1ee4451 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html a066acab8a4396ca905250ed11b05826cb056ba17058c6fbf37c71827c557abd 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html 1afa605a23a391c3e6d5045c64e97d94c30dba6775c115d00ab708a6fbc8d8ec 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html f235286ab1306a8b2284f183e0634f1850305e98de1d93a7e3977b224ca4c3f1 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html da6e27c203288f30dddd78d7ec3daa2d2c73a00c8604b3815a31b9b2356edd03 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html cf035b32625f32e4e12317a17d8bb191803dff680e305ff55a0c8a0e978476b6 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html f9742e26768499cfd0a462d27ab935de191318c5dea64fc7df035fee49bef842 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html f467d91b3e07fe329eb0955e2572aa4ddb75777b8007c56df28ee9d5de42d536 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html 6846c92faaf2ad84c76ae955da35c28ab2a91b4717b36c536302d4ad63791eac 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html baf62d0e919d358a6279074a985d2397a2337b12f95a471862f8e75fbdd12e12 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html ad493f2011ea56b5c61b6fb9d6be22e418963aed423f3def9ac2c1ec1b8f84dc 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html 5c968104169b2852667c59ad3989e25f70b3785b572603dd1090fbee8f985123 2 @@ -956,20 +956,20 @@ -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html 26532337bf94347d6aab4aece8c51d8aa89fa36d55947e0dab16315fc62f8d31 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html 22fb06675e30b42bbf4fe2ab5747712aa7a6baab2592cc105bb3b710a480f6bd 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html 526c5ea8bb7347f0a2fa77c0c0d18574b8c5b95f975c194b24c25e67ea38732a 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html efbcc4e4036513ae57795ee84e97cd419352461e14b0a7845bf46eeae5512f9e 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html 4ee2ff34a1fb1f1ef2d550cad8666fec04f7faf2c8ce35e14ead56776c5a5654 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html 05696eb37db0ee6240acc8644bf7ed5e009d448ee3e1d5c78c5ed68af89b1ecb 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html 6ef8481782a7f2a3e98d4cc8e00caf4d4f1cb8cf842e1ac7093330a71d68e137 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html e36db3119a3948e11e8a181d24fc21a3d873e60a30df6dec4fb394c9654fc836 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html 34178368386af217f334dcfc995b000e39e4b72e01adc9c5c3cfd99f5c81d5ac 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html 973b23f4d410909432c21712040822df222c204798a22ae6b42e25178c4f6a3d 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html 4eefffdaa7b01f50f666e6dcc1d20bdd37d78f00d06f360807b8e268fe0db0f7 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 639091279a2950a90634ed8a7399317c56c2696d8ce26c50261a33df33804d99 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 8c03a9cee8c0f69b96d3f6c46b2fe8d152c5b5ca238032a379184fb72a0b7f65 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 1d0c7881bce7f11c7aadf69063ee082fcbfdee30fb8a45d6eb384386be53ce4f 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html b7a1c35a20e8f95d886c3d0cd5a2de02d620a5a66c7f5cd1f4b81f66ddd9ab6d 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 17105ae3ac9bc5e3b077b4d74a859c05d9c8c929b9b51a43aa69575f7c426e67 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html fb1106d4e028d231a79170c4fc82a27fe3888e309445189969f89496fcf48530 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html cd0df94d9157986c79005d8f28922eeb3f149ec1a4e4b6fdc2f4efe65b235d07 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html 9642ec355e7218c952d48496a2aced69ddc4c8202b993de13deb496ece082d2d 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html a816a35356067c9a0fa541bb419319dd737a10fecf5666ad368d1ea59ed9b04b 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html d0a6af93f0d03316dcbf7b7e816f90d7b2170b204377399dd9d256c1657926cf 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html 7cfadce41179414a47ded413967d5e330632269e2dbbde453fa01cddb4d719e3 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html df78710b9d639b4eeb6ce84cd5e32cc29b72149be4c464e8413f33316165cbd7 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html bce7a1cf07b6e154bc90e3e792f2603824254a8586845a85b560073319402f1b 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html ca5b9ba1e5265b54c99331ca578beaa6092d97faf689963162899acfac2cd065 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html 0639f20b0ad36eb5ba183532811599a52944bfb91132c19d58cb4c6e3b309dbe 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html 4cb1b9604c85620524d368eeadb5834595791328f58d2d92c82abda63ce586e8 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html 6bf13af60eefff1366b31c3e4e9e61d668cd24cf140e364e8331101f041f342c 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html 71c9f16a9c43cb92eb82ccf6f8d7f6b1df500956f3a1d3f2e22642fb0a885197 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html 6419a2010f99fc9b71d138e287be49963d961180d31645dae2c6a99fe365cdef 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html ba7dccb74acded56413e4fa376ff5ec77db07e0b7ded5f5be8de46d4529375e4 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 33b1489d2104fcf3a11fbee005cf8e45878b21b8bb9bf4cff91aac91a9dedf7c 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 90ef2cbc46aa683a4983ba4043222b3c51e6fb7eeb099d59fefbe5d5164ab2c7 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 01236b234866a3b2762136fe6e7b98bb7b64df1426544b94c29e2c8b90290de2 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 4715adbaddd60564bdb83cf9717166bd2e68d90d79b02109fcbe082c705396d9 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 3604328ab4ea04643655b012f287e12927b657118867c61f4f9ada3a724a0620 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html 9809304fd83db382393bffcacf55d422980b703d4d2ac858344b1c5bfe3e5413 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 25d45b95ca5acafa2b4af62be16979e4007d76dec123262f1ef118f9eb76ee11 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html f7a229902c9c04b99fb9b066b16ffda9f1956cbd121ce336ce301a22944eb8c8 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html 91b0aa441a7d045ef9dd5ac2b435c5073a5fff6e1cf77956579e419c10644745 2 @@ -977,19 +977,19 @@ -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html 3603941bb9e71d3b67540376d70438098c2de7c37d4872ad62aeb68b4e0b5563 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html c55f37da60824e9d82caef5a9af428ed4dc6c518bae406200011dcff383c9a2c 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html e3ecdd1d5ca1c3c5e89b1469916879e765b64bfd3956ba4dcec57387883f211d 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html b70c7912843acab23299faca4c4e779ebd7b1f138b1c0d1613dca9cffbdfddfa 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html 6649b050c0975527a7a4691f41116e79be1724f7ae78b7c267544654f942c64e 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html 532a4cefcc912dcd5625b37a974df3784e1f833660e7e5575bc8f48cff6ac6c8 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html 01b04cca4fab4e4fbb6970e3892875aa733bc3b72258833539a0d1b2cd1e5c75 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html b4c689791f63da79b6394ca80bed1a244016d2aef682f60110716c88701e86ad 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 2c24036d52ce97106d6ca16c07f705950a32d9f0bc4f9b77fea0131c329ab3d5 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_advanced.html 085685be39034f41b1b3ab68cd64f936b2833646e2a9c3c2865defcdb83b29df 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_basic.html a664227cc288bf0065e31eb9d2e6ecdf872f7682d58c6c0501e1f579fb88d45a 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_intermediate.html 5da23b39fadcd8664004375c53a05e44056d61e9a3789e469c419420e9777fcb 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html 7dda31c31d05b79dd1ad7f1b417d688effbd178b261bcf735d33397f886a8df7 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html e63bd952db00406861a4e1b6aad79186a1cd646e362f1074b3ebe612d7f09d1b 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html 42014fbe89f2126b98175acf06adb067dfc5ce8195e0e5d31e07e71d6c5ba79b 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html b82bc3b1fa6fa2d7a60574c280027dcb7aa1694ced4e5a88fd0eefade9692281 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 3308bb69607a41ec6ebc9121079587f85733e1ebb265159c979fb8a1755e8051 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 730353e1d64d90dd6ef4408e56ee1700ce7c6d0cd1d3552732830c170abe2f39 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html 5a5168d51f54d7c56aed4f2c36694d0fcd6ef02523be7d60e364bde8a6bc7cb2 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html 04aae3465cbd6791c398e331aaaf7ce73b1ee3206e836b06bf957993e30eba14 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 475b8ea553f0379462bcbfacf9f1c817e1afb81eff38b05eaf94a0cfcb956d76 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html 2b70140978eb543acd33f8f92841af751c0a72a54032feb094f17c2b264e0563 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html 939396b25ceaa8ea2775da9e2a6098c5bbabc0f81304e43abb7992a8debc0017 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html 99b21cca8872156bb639cd387e82afa13995c21fc20cd1a73923b8a6aedac34b 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html b1cec893dea17c0a63dca36e691fc4a625829064939d9d32958d7c97942c5e4a 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html a9ce524d7d38208cbb60b05dfc57e8e5af1ce582d9237081903c85e6453b43b8 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html 3ac3c572566b8ae098a0e566aa66c6b6cdaa791cdf7a1a14aef0203ec85665e0 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 0c211742ffacea2dea386215401d5e25fd44b84b4cd5ef7b645b28e9440e7492 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_advanced.html 87586d237f4c49d6ce56156a1b01083ea5e99b7253c61824bad373bdc1ba9701 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_basic.html 321ddd5f60715e755424f5c3652b9c667703d07b69ce785393a43b71c729ead2 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_intermediate.html 99b1dd6733a5ac4a0291b458779dffbdf90d0377c052494efec18c6727f0dc3d 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html afaa80ae70dab33085217f36000638c1cf7b381c2512a4fd975031afc0ee15d3 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html dcbc98b7ab0e5af930b4a7e95373e590e77b3810fe7a0ad4dfdf3b76884831ed 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html d7faff5b9437017bc9bb886378f5c26b3bbf1c78b7f3a80a0bed9fd626e946cf 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html a984ad7e4711658d414377696cddc38b9fb162683ad8862572808864f7cb6c7a 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 8896762116fdd0c8ce49b30538d82fada71324a9cf63f44cf0186016152349f3 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 7cb7690ef4c8c9f2539dadca46a40300b451933a857a1da949bd75bbe825d6b1 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html adb3290bbd3ac2dadd24bd2ce3abd3d569e76e488d51811f57828289f4205e37 2 @@ -997,5 +997,5 @@ -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html 37ddf5ba17da4ade753043e9deebc0559545e23b4915522fd5297165346a6d01 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html fbc8ffe5be831a7d0a59dec1a12e1dfa954a8b25b372c974193a4ddc926a0480 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 848c75dee78c69f91447d1c117c4848fa6479aa575d64b46aa01c663f52d9bb5 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html 6cfe97cb08250f08f96fd86434855947714a2740379eb6d9d43d788b95c629c4 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html dd2f6599aaaf4458231021512e78b59f188d1cca214220184de43399b85c3ddd 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html 4bcd5832911dd02cb4422b605e39a12cd56ed8be7dc91c01de9e57be91278db2 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html 2e69e81a8853066f7bd0616ccc65c3093e83472588e15cdb96f1e95eb9a4ef1d 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html a9c9b9916c60f8216689eb9fd8de1ddb5d85c08f86de898e55f376b19b0c4e50 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html 1690a7fe9fb7837c386c17f48673bbc83f755da7f89ac209508603dafcba795e 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html 2d3fbb9145b7f63ce3846e35ea2078b52a69539ef4c8d5eab0bf2e16d0ee04a4 2 @@ -1003,3 +1003,3 @@ -/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html 1ca7507c3dd576a93807610ae4dbc545df7a2b2884bd11f848193534ab0e8990 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html 9f8bd326fccca427ac961e56f899a9f5e232cec56dfaf844b6412308a7a64d0a 2 -/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html abbd8bad1677196fd1f05bf37b1bd3484ca96775e0dac8894d8116f7ae46dda2 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html 02e1358053be4b08a1bc7167d1f597d007251c0f222f4dda49da303ecaa43584 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html b5c58d85ead106a3526f0b548c21d800db8726355da9a07c6acc46b909edd077 2 +/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html cbbbd9d7c2e0a744231ef8bd33046fa37008457582a7ebdda2740545c184a28a 2 @@ -1007,2 +1007,2 @@ -/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 00681f00fcb75f061451165f839acf03d5d713ecb2d39687c581197e065b0b11 2 -/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html 44920e13fd9e1afca7f1ef01a125963c71bfde0579473ba2d8b9d6d2912c6d0c 2 +/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 96906e9c6077f6dfad24af124e359a22ffcd48c6a2827c6f6b37052323325e13 2 +/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html 146776b52240fd12ecad92cda6b39e7e5e1fe2b6bd9466aa4e754872da19aa74 2 @@ -1461,2 +1461,2 @@ -/usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 0db836aa709215189d6ac6e7f4cc849ae5abc4a4cc52b4c278f20bb81f6d5197 0 -/usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 895073316405cf354f6b9092c87b48593269391761a92b7d72cbff6a117ebf1b 0 +/usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml d54987fcd72dd90bed3284a8eaeac02017a332f32a4d9909982f002f266c80b4 0 +/usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 143c042713c2c509408c0cc875e433adc6c075b17705526eabe7b5d57f23bb79 0 @@ -1466,9 +1466,9 @@ -/usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml e6040d7b41b4b7532a2e2f5f4274b8ee5d95ce6b62538419cf4034f9f72066d4 0 -/usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml 0d7b660d6b4c750daef7ca3511dc024887386fc3f625e86af4c51f97f0317587 0 -/usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml 15dff00a03b874ecb3a651f84171990bedbb3545bb34e67b7840108513f4bfca 0 -/usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml 1fa99930862460bc44a64dfaed3dcf29e1efb5e0ebbc51e7c0579161e30563b8 0 -/usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml b8458d062ff25c8cd0d63556902dc47a5370de59cb9d20f5732d99b1484361cf 0 -/usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 5c8680c69267de34dab27edeb96f7529fd732a4f12406c82588c6943a1db6e31 0 -/usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 7b140d35da471e831a6623ac4fe575abd87ef74de0315e7b8f251ae629967398 0 -/usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 7e500dc7fff3a53d81749e8c43a70a7d029b006dc5becebae65aa7624d26347d 0 -/usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml da180425207c7388f7a699b74c33c04243a6f5f36883b120f106bf4ca24d18d1 0 +/usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml a27931722ae2cde5f06aebfb1d3ac3d5672809a7f466a515198d70eee3a494ce 0 +/usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml a87a0002329b76e7f63b53c142f9bd79e4bc6ce6caf190b222092aadc1595e9d 0 +/usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml f93999be5beb7626384b37959750e8fa6412f6b5caf667c546e3cb60c5177551 0 +/usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml 86e3fe6424cb03254f33291de170517c2d909344980162407087099f187fe4d9 0 +/usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 9be47e87fb4ecf7d5150ba94478685b77682175b2cd8200ca7cd0b85f7446e2a 0 +/usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 7373e867a919b7a2744e1d85a57fbd4487805aa7ce396903d42b59131763405b 0 +/usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 4cb4777bd93d6422fcd97f9f9ca560d69fcc4f3d401ac654c25fd53f2209efba 0 +/usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml a17a81a15462e55c2a66cdb3887df4289d783a0adb05664dfb2b652d849faec8 0 +/usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml 0156c9d7f0369e31884b482c089e5e21f086132cfc2b105f324ec77bb6c14c7b 0 @@ -1477,2 +1477,2 @@ -/usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 1201bd7046e5becb652cb5af3e55539b3c439b81b226af8acf668b7d203ba538 0 -/usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml bf16e1ecd0824073005588075b58c8560744f088d3e4b5896c20ef1c67f323b0 0 +/usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 328057d99cdd380b9231d0577981e857bcaab0762402d60c62b907856bbf1ca8 0 +/usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml 24bba53a1caf28843180ad1c9c20ac9625dc3e8fdc7e48ea926043b2edfdb760 0 @@ -1481 +1481 @@ -/usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml cb0ae3e83f89d3236ae1305a9643656d96511701c41780d122af7bbefcb70f6f 0 +/usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 83c082bc0906ec6e9a3ea0943050b058f2c1e5639d68fcbea8bf258b9aa64139 0 @@ -1484,2 +1484,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml a4eff61320160726fcb8472ea040aa48607865aa32df316205ff93ff49cf3395 0 -/usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml 919fe03707a06bbc39562ea3ca7e04e130215c7786f32f33982f956a0913ae21 0 +/usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml 5fbbb73c7ddbb72d480d11d66c4d69b7c73f98f830623345d6e6403a068464dd 0 +/usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml 4d88e815d06b518f20fc7c48b7d5933fdfecf843cd7aeb39d957423edc786281 0 @@ -1488 +1488 @@ -/usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 32a79e5cbfa01dcbb356536fafe739bf1faa64d3f85b2313c24d1bb524c21d0a 0 +/usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 0bbcf9f6c2b29f3c434b0c0830bc54723b5b8005cdd8ede9a9f29957b1e16031 0 @@ -1491,2 +1491,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 93b457c9fe3a5905268065db3b744bcf25853d19d921a0ede502755cd2f0fd6f 0 -/usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 897c4a85240d4cbfcd5742aa1f3b0ac7e15a862f261261007bff493be2ceab6e 0 +/usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 18b8a893751140cff7327b5984882dc05527a7ee3dcef8e331db4b7910374262 0 +/usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml bbb8380afee73bc461b4d4178d33dcb054a8666d94000b4e8c0d80628378487e 0 @@ -1495 +1495 @@ -/usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 5e7d534d83e1de91dd896bc73efb79f171b3327075f5de73a2c134489aa8e269 0 +/usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 1d4bb6524db4eddca6579719944e9fb3677ed4044f4c49f062ca1342f5ba4231 0 @@ -1498,2 +1498,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml b4569086a436ef73ff3f64737dbc00f0249940adc5765dfe2c6962c9b7b1bb9e 0 -/usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml 5d3c3bcd1ffcf1d38408f643a2a5962ad7914c59cb3e94e6b4246b82480e089e 0 +/usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml 6b5cd2eb640e2b080013fa70209a9011d2db67ac6e83ab0e32a14454d6aac2c4 0 +/usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml af16180e2986513e2f50177383983a243053d59e35f414c6a7dcbd2ed3ed262e 0 @@ -1502 +1502 @@ -/usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml dc60ba667c29e7f5273b046d0ab764690e7a1cdaa50b1e2c0d6c45f6160e6a2c 0 +/usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml a8a8d886109e85e3854c72ffaed096a4cf9117e8d38cc5ebdbb0c45c520dba2b 0 @@ -1505,2 +1505,2 @@ -/usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds-1.2.xml 4c074af522134384690f46409180b6bf05709b301e6905915af12142b75f8d5a 0 -/usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds.xml b4e01180aa4314863da2730ac67a8dbde68e6b62bc109d05638943376565d097 0 +/usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds-1.2.xml 3fd30e7f9a5915dfc35c37696b0ca946e4215d306376a0088ebdb63df6a0e605 0 +/usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds.xml b7fcdb234aec19f532a67a7272e0aee00825335021df1d2a12aeb14a795e9ae7 0 @@ -1509 +1509 @@ -/usr/share/xml/scap/ssg/content/ssg-openeuler2203-xccdf.xml c7e28be56c86816232949691a688f14ff25af6200b989e14b23db7548afb0a88 0 +/usr/share/xml/scap/ssg/content/ssg-openeuler2203-xccdf.xml b8f5c7621a13656e37fd405ed57de92446a73bbc3b9b4d08d4a22533daab2544 0 @@ -1512,2 +1512,2 @@ -/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml a2b53b2eaa50c5a4260f6de69279e4c6d5aa8510f0811f55b3d4cc6f5b4e98f5 0 -/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 1fd75073cc7b6d8b3fa874e0cf6b3bec067d17d12a45313f9e30795549a644d7 0 +/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml ad4183ce3ef76cc7b902e4add2849bbd50aabc267a27632cf42467b7bea56a8c 0 +/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 09ea94ba376602385cc7d306b48c4ac80beee0df08b2ef5daa2c72ceac318de8 0 @@ -1516 +1516 @@ -/usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml ee957f836be60f3e8c6a46d2f5c6d2c0e7aed44358fad12b11c51aee52e047ae 0 +/usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml d1c83d48c7f165e59393d218e1f17158b8fb9055e040e8399c6d220b32a6bdfb 0 @@ -1519,2 +1519,2 @@ -/usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml 5e35c175eeae04bdfd82b051e936bd364578f28aa430fef2ee9acddb7230906f 0 -/usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml 8c6dc6276b246d83b714a0712f36671f8b8b146c9b69ba295aa5b5abfa0e0a94 0 +/usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml 409d6590a0e227395f9eadddd3a3250728bf4bed4158303911e75f443afa7cc8 0 +/usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml a381672811c1d810ed622fb6447f40e04ed24e6a3eb4977aa261a9c0af8c1c96 0 @@ -1523 +1523 @@ -/usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml cb61db60b62457a77bf1525eeeae2e421323edd439a3259cb02af909cbf45922 0 +/usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml dbea6984595a303ad4aa96f77831f9e82b490ed98b446241dbd695c26c72a078 0 @@ -1526,2 +1526,2 @@ -/usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml dc30d654cb9d17e9f91ca322365c5d915dc8e24c85f749993698d068e630eae6 0 -/usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml 629d4410bcbff03e107dc57a468b7575dc2019c6f6c23293d78ae4412e0d4e3a 0 +/usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml 1b3318f5d1c51e37feb9c0fc83ceb31400cbcb395d170b9eb564d782c8c2ae3e 0 +/usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml 2342264798cf02026150ff29001fef5c29942676cc47ea4d07fd791a08a32f9e 0 @@ -1530 +1530 @@ -/usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml 1c909ed6e06e486a529ca2328139c6f89f58cc3b6e71f933fb55d7f3b1541c03 0 +/usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml 5a791f1ac07e561655dca020dbbaf6724b2da7debe98539bbd9cb05b07a98a08 0 @@ -1533,2 +1533,2 @@ -/usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml 646b9a16fab0cf7b7579d86cf2f449dd0e5c6d325022948ceb45d13e1526b2fb 0 -/usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml 5e70527a6c71fe00eac2aa312825241c6ddb39544b084af7d5b5d3672c88ef4a 0 +/usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml 9fce8e36967c51b002bb6b90d8be135dc7d78cd726dd4782ffffa2b012f18138 0 +/usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml d9f83d09881d15596a7dbf029b0c6e9d9b8944afc82cccfd8916fc101f32d4a9 0 @@ -1537 +1537 @@ -/usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml e7feb2604842e5e3823d0ec1b9e2673f0013fd4541449fce5942c1456a324220 0 +/usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml f4e66a473df133b05c63dd5f81ee60889b977444f2b4c72b64bc651b8db1186a 0 @@ -1540,2 +1540,2 @@ -/usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml d0232f2a2e563af2aaa142e1a44d649c9e79b003299dbc97dbca70a95598134c 0 -/usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml b994a1142b7284b89598f992c605ca0fabfd36d94f402082edd15885c97bf9be 0 +/usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml bb094bdb00628301fc0d6f99a6a45517f26a8d45244112aa070c6cc022c5b6da 0 +/usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml 60fb55341159ec57f262e0abe18b43245086e45710bac81813fadea11d48fccc 0 @@ -1544,4 +1544,4 @@ -/usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml 1239dc23b184e20ca5a2672a68a4bbea6b5c76efc8c434a3e3ab841c03f13675 0 -/usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml d96c4cdd29946b42cdb808b5ca5f16764b7b06e474615cac7cfc30003af7ce0e 0 -/usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml 61ebb1387c3659d855743e9b96beb9c91d4c9b6965bf9d8cbeab82cf03428ce7 0 -/usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml f94485dedad15ead847a107a90325dfd3f62a42a6b2ce41512886f37c6002c2a 0 +/usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml 55b297ce9ebb9277c4d429c22758eba55d577cd1e94c78bcd0ac760d4072462c 0 +/usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml e4c51ee61b4a23d0a0b634b6866eb744c1a5c6bd044245b0ccc58299320e956d 0 +/usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml 5260906c909f1b739e010259e28858b5361ba40cc3db0917622f9095f1af7178 0 +/usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml 576d59e45e44366a89f3a199bcdd9c3e14a5ca686bf6a807259c04c4393b34dd 0 comparing rpmtags comparing RELEASE comparing PROVIDES comparing scripts comparing filelist comparing file checksum creating rename script RPM file checksum differs. Extracting packages /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-C2S.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-C2S.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-C2S.html 2024-05-31 07:52:34.000000000 +0000 @@ -84,7 +84,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleC2S for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_C2S

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Base Services
                        3. Cron and At Daemons
                        4. DHCP
                        5. DNS Server
                        6. FTP Server
                        7. Web Server
                        8. IMAP and POP3 Server
                        9. LDAP
                        10. Mail Server Software
                        11. NFS and RPC
                        12. Network Time Protocol
                        13. Obsolete Services
                        14. Print Support
                        15. Proxy Server
                        16. Samba(SMB) Microsoft Windows File Sharing Server
                        17. SNMP Server
                        18. SSH Server
                        19. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 101 groups and 234 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 77 groups and 322 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 78 groups and 378 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 64 groups and 232 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-anssi_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 25 groups and 42 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server
                        18. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 116 groups and 392 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Print Support
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 98 groups and 298 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. Mail Server Software
                        8. NFS and RPC
                        9. Network Time Protocol
                        10. Obsolete Services
                        11. Proxy Server
                        12. Samba(SMB) Microsoft Windows File Sharing Server
                        13. SNMP Server
                        14. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 93 groups and 290 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 113 groups and 386 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cjis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 @@ -78,7 +78,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCriminal Justice Information Services (CJIS) Security Policy
                      Profile IDxccdf_org.ssgproject.content_profile_cjis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                      2. Services
                        1. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 47 groups and 102 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -90,7 +90,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleUnclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. NFS and RPC
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 50 groups and 103 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Obsolete Services
                        3. Proxy Server
                        4. Network Routing
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 46 groups and 94 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 54 groups and 142 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ncp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ncp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ncp.html 2024-05-31 07:52:34.000000000 +0000 @@ -101,7 +101,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST National Checklist Program Security Guide
                      Profile IDxccdf_org.ssgproject.content_profile_ncp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. LDAP
                        4. NFS and RPC
                        5. Network Time Protocol
                        6. Obsolete Services
                        7. Network Routing
                        8. SSH Server
                        9. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 105 groups and 385 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleOSPP - Protection Profile for General Purpose Operating Systems v4.2.1
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. NFS and RPC
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 50 groups and 103 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 87 groups and 258 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleRHV hardening based on STIG for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_rhelh-stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. LDAP
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. Network Routing
                        9. SSH Server
                        10. System Security Services Daemon
                        11. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 100 groups and 377 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-vpp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-vpp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rhelh-vpp.html 2024-05-31 07:52:34.000000000 +0000 @@ -99,7 +99,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleVPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtualization
                      Profile IDxccdf_org.ssgproject.content_profile_rhelh-vpp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. SSH Server
                        2. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 48 groups and 142 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rht-ccp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rht-ccp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-rht-ccp.html 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleRed Hat Corporate Profile for Certified Cloud Providers (RH CCP)
                      Profile IDxccdf_org.ssgproject.content_profile_rht-ccp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. Obsolete Services
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 38 groups and 68 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. File Permissions and Masks
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 32 groups and 74 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -85,7 +85,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                        10. System Security Services Daemon
                        11. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 103 groups and 281 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -91,7 +91,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:centos:centos:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                        10. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 101 groups and 280 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 77 groups and 328 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 79 groups and 402 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 65 groups and 241 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 25 groups and 47 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server
                        18. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 115 groups and 395 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Print Support
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 97 groups and 297 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. Mail Server Software
                        8. NFS and RPC
                        9. Network Time Protocol
                        10. Obsolete Services
                        11. Proxy Server
                        12. Samba(SMB) Microsoft Windows File Sharing Server
                        13. SNMP Server
                        14. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 92 groups and 291 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 112 groups and 389 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -90,7 +90,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleUnclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Kerberos
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. SSH Server
                        8. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 62 groups and 210 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Obsolete Services
                        4. Proxy Server
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 48 groups and 98 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 54 groups and 137 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ism_o.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 @@ -84,7 +84,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) ISM Official
                      Profile IDxccdf_org.ssgproject.content_profile_ism_o

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. Proxy Server
                        6. Network Routing
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 71 groups and 151 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleProtection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Kerberos
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. SSH Server
                        8. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 62 groups and 210 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 85 groups and 256 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -85,7 +85,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. FTP Server
                        4. Kerberos
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Hardware RNG Entropy Gatherer Daemon
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                        13. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 106 groups and 411 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -91,7 +91,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Red Hat Enterprise Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8
                      • cpe:/o:centos:centos:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. FTP Server
                        4. Kerberos
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Hardware RNG Entropy Gatherer Daemon
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 104 groups and 407 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                        6. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 74 groups and 315 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                        6. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 76 groups and 399 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                        6. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 63 groups and 235 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 25 groups and 47 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_advanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_advanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_advanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -78,7 +78,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCentro Criptológico Nacional (CCN) - STIC for Red Hat Enterprise Linux 9 - Advanced
                      Profile IDxccdf_org.ssgproject.content_profile_ccn_advanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DNS Server
                        2. FTP Server
                        3. IMAP and POP3 Server
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. Proxy Server
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 67 groups and 140 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_basic.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_basic.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_basic.html 2024-05-31 07:52:34.000000000 +0000 @@ -78,7 +78,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCentro Criptológico Nacional (CCN) - STIC for Red Hat Enterprise Linux 9 - Basic
                      Profile IDxccdf_org.ssgproject.content_profile_ccn_basic

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                      2. Services
                        1. SSH Server
                        2. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 39 groups and 89 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_intermediate.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_intermediate.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ccn_intermediate.html 2024-05-31 07:52:34.000000000 +0000 @@ -78,7 +78,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCentro Criptológico Nacional (CCN) - STIC for Red Hat Enterprise Linux 9 - Intermediate
                      Profile IDxccdf_org.ssgproject.content_profile_ccn_intermediate

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DNS Server
                        2. FTP Server
                        3. IMAP and POP3 Server
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. Proxy Server
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 61 groups and 127 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server
                        18. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 112 groups and 360 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 96 groups and 274 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. LDAP
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Proxy Server
                        13. Samba(SMB) Microsoft Windows File Sharing Server
                        14. SNMP Server
                        15. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 91 groups and 270 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -79,7 +79,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. LDAP
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Proxy Server
                        13. Samba(SMB) Microsoft Windows File Sharing Server
                        14. SNMP Server
                        15. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 105 groups and 354 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -90,7 +90,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. SSH Server
                        5. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 46 groups and 144 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Obsolete Services
                        4. Proxy Server
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 47 groups and 96 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 51 groups and 131 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 @@ -84,7 +84,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) ISM Official
                      Profile IDxccdf_org.ssgproject.content_profile_ism_o

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. Proxy Server
                        6. Network Routing
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 70 groups and 146 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleProtection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. SSH Server
                        5. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 46 groups and 144 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 84 groups and 248 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -85,7 +85,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. Application Whitelisting Daemon
                        4. FTP Server
                        5. Kerberos
                        6. Mail Server Software
                        7. NFS and RPC
                        8. Network Time Protocol
                        9. Obsolete Services
                        10. Network Routing
                        11. SSH Server
                        12. System Security Services Daemon
                        13. USBGuard daemon
                        14. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 113 groups and 496 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -92,7 +92,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Red Hat Enterprise Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9
                      • cpe:/o:centos:centos:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. Application Whitelisting Daemon
                        4. FTP Server
                        5. Kerberos
                        6. Mail Server Software
                        7. NFS and RPC
                        8. Network Time Protocol
                        9. Obsolete Services
                        10. Network Routing
                        11. SSH Server
                        12. System Security Services Daemon
                        13. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 111 groups and 492 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-cusp_fedora.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-cusp_fedora.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-cusp_fedora.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCUSP - Common User Security Profile for Fedora Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cusp_fedora

                      CPE Platforms

                      • cpe:/o:fedoraproject:fedora:36
                      • cpe:/o:fedoraproject:fedora:37
                      • cpe:/o:fedoraproject:fedora:38
                      • cpe:/o:fedoraproject:fedora:39
                      • cpe:/o:fedoraproject:fedora:40

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. Mail Server Software
                        8. NFS and RPC
                        9. Network Time Protocol
                        10. Obsolete Services
                        11. Proxy Server
                        12. Samba(SMB) Microsoft Windows File Sharing Server
                        13. SNMP Server
                        14. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Fedora   Group contains 93 groups and 272 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleOSPP - Protection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:fedoraproject:fedora:36
                      • cpe:/o:fedoraproject:fedora:37
                      • cpe:/o:fedoraproject:fedora:38
                      • cpe:/o:fedoraproject:fedora:39
                      • cpe:/o:fedoraproject:fedora:40

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Hardware RNG Entropy Gatherer Daemon
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Fedora   Group contains 62 groups and 206 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v3.2.1 Control Baseline for Fedora
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:fedoraproject:fedora:36
                      • cpe:/o:fedoraproject:fedora:37
                      • cpe:/o:fedoraproject:fedora:38
                      • cpe:/o:fedoraproject:fedora:39
                      • cpe:/o:fedoraproject:fedora:40

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                      2. Services
                        1. Network Time Protocol
                        2. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Fedora   Group contains 47 groups and 121 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Fedora
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:fedoraproject:fedora:36
                      • cpe:/o:fedoraproject:fedora:37
                      • cpe:/o:fedoraproject:fedora:38
                      • cpe:/o:fedoraproject:fedora:39
                      • cpe:/o:fedoraproject:fedora:40

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Network Configuration and Firewalls
                        4. File Permissions and Masks
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Fedora   Group contains 39 groups and 76 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_enhanced

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 74 groups and 307 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - ANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_high

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 75 groups and 361 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_intermediary

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 61 groups and 224 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_minimal

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 25 groups and 42 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 @@ -69,7 +69,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCriminal Justice Information Services (CJIS) Security Policy
                      Profile IDxccdf_org.ssgproject.content_profile_cjis

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                      2. Services
                        1. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 47 groups and 102 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleUnclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. NFS and RPC
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 51 groups and 104 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Australian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Obsolete Services
                        3. Proxy Server
                        4. Network Routing
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 46 groups and 93 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 54 groups and 142 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ncp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ncp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ncp.html 2024-05-31 07:52:34.000000000 +0000 @@ -91,7 +91,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST National Checklist Program Security Guide
                      Profile IDxccdf_org.ssgproject.content_profile_ncp

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. LDAP
                        4. NFS and RPC
                        5. Network Time Protocol
                        6. Obsolete Services
                        7. Network Routing
                        8. SSH Server
                        9. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 104 groups and 382 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Protection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. NFS and RPC
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 51 groups and 104 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 48 groups and 99 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleSecurity Profile of Oracle Linux 7 for SAP
                      Profile IDxccdf_org.ssgproject.content_profile_sap

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. File Permissions and Masks
                      2. Services
                        1. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 10 groups and 9 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Oracle Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. File Permissions and Masks
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 28 groups and 72 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Oracle Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                        10. System Security Services Daemon
                        11. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 103 groups and 286 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Oracle Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:oracle:linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                        10. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 7   Group contains 101 groups and 285 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 73 groups and 320 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 75 groups and 399 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 61 groups and 233 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 25 groups and 47 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 @@ -69,7 +69,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCriminal Justice Information Services (CJIS) Security Policy
                      Profile IDxccdf_org.ssgproject.content_profile_cjis

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                      2. Services
                        1. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 49 groups and 107 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleUnclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Kerberos
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. SSH Server
                        8. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 63 groups and 206 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Australian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Obsolete Services
                        4. Proxy Server
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 48 groups and 96 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 54 groups and 140 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Protection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Kerberos
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. SSH Server
                        8. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 63 groups and 206 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Oracle Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 83 groups and 254 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Oracle Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. File Permissions and Masks
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 29 groups and 78 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Oracle Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. FTP Server
                        4. Kerberos
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Hardware RNG Entropy Gatherer Daemon
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                        13. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 106 groups and 410 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Oracle Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:oracle:linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. FTP Server
                        4. Kerberos
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Hardware RNG Entropy Gatherer Daemon
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 8   Group contains 104 groups and 408 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 70 groups and 312 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 72 groups and 391 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 59 groups and 227 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 23 groups and 44 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. SSH Server
                        5. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 45 groups and 109 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Obsolete Services
                        4. Proxy Server
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 44 groups and 94 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 51 groups and 133 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Protection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. SSH Server
                        5. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 45 groups and 109 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Oracle Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. Network Time Protocol
                        6. Obsolete Services
                        7. SNMP Server
                        8. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 78 groups and 245 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Oracle Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. File Permissions and Masks
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 29 groups and 78 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - DISA STIG for Oracle Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. Application Whitelisting Daemon
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Network Routing
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                        13. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 116 groups and 493 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -73,7 +73,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - DISA STIG with GUI for Oracle Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:oracle:linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. Application Whitelisting Daemon
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Network Routing
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Oracle Linux 9   Group contains 114 groups and 490 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-openeuler2203-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-openeuler2203-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-openeuler2203-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for openEuler 22.03 LTS
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:openEuler:openEuler:22.03LTS_SP1:ga:server
                      • cpe:/o:openEuler:openEuler:22.03LTS_SP2:ga:server
                      • cpe:/o:openEuler:openEuler:22.03LTS:ga:server

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. LDAP
                        8. NFS and RPC
                        9. Network Time Protocol
                        10. Obsolete Services
                        11. Print Support
                        12. Samba(SMB) Microsoft Windows File Sharing Server
                        13. SNMP Server
                        14. SSH Server
                        15. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of openEuler 2203   Group contains 95 groups and 258 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - ANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Mail Server Software
                        2. Network Time Protocol
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 59 groups and 236 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - ANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. Mail Server Software
                        2. Network Time Protocol
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 60 groups and 280 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - ANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Mail Server Software
                        2. Network Time Protocol
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 46 groups and 156 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - ANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. Mail Server Software

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 13 groups and 8 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi-2022.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi-2022.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi-2022.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - BSI APP.4.4. and SYS.1.6
                      Profile IDxccdf_org.ssgproject.content_profile_bsi-2022

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. SELinux

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 2 groups and 3 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-bsi.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - BSI APP.4.4. and SYS.1.6
                      Profile IDxccdf_org.ssgproject.content_profile_bsi

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. SELinux

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 2 groups and 3 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                        4. SELinux
                      2. Services
                        1. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 23 groups and 51 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high-rev-4.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high-rev-4.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high-rev-4.html 2024-05-31 07:52:34.000000000 +0000 @@ -87,7 +87,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_high-rev-4

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 52 groups and 242 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 2024-05-31 07:52:34.000000000 +0000 @@ -87,7 +87,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 52 groups and 242 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate-rev-4.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate-rev-4.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate-rev-4.html 2024-05-31 07:52:34.000000000 +0000 @@ -87,7 +87,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_moderate-rev-4

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 52 groups and 241 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html 2024-05-31 07:52:34.000000000 +0000 @@ -87,7 +87,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_moderate

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 52 groups and 241 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNorth American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_nerc-cip

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 52 groups and 241 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig-v1r1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig-v1r1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig-v1r1.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_stig-v1r1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. GRUB2 bootloader configuration
                        3. Configure Syslog
                        4. File Permissions and Masks
                        5. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 31 groups and 120 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux CoreOS
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux_coreos:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. GRUB2 bootloader configuration
                        3. Configure Syslog
                        4. File Permissions and Masks
                        5. SELinux
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4   Group contains 31 groups and 120 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html 2024-05-31 07:52:34.000000000 +0000 @@ -75,7 +75,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleC2S for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_C2S

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Base Services
                        3. Cron and At Daemons
                        4. DHCP
                        5. DNS Server
                        6. FTP Server
                        7. Web Server
                        8. IMAP and POP3 Server
                        9. LDAP
                        10. Mail Server Software
                        11. NFS and RPC
                        12. Network Time Protocol
                        13. Obsolete Services
                        14. Print Support
                        15. Proxy Server
                        16. Samba(SMB) Microsoft Windows File Sharing Server
                        17. SNMP Server
                        18. SSH Server
                        19. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 101 groups and 234 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 77 groups and 322 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 78 groups and 378 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 64 groups and 232 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_nt28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 25 groups and 42 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server
                        18. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 116 groups and 392 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Print Support
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 98 groups and 298 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. Mail Server Software
                        8. NFS and RPC
                        9. Network Time Protocol
                        10. Obsolete Services
                        11. Proxy Server
                        12. Samba(SMB) Microsoft Windows File Sharing Server
                        13. SNMP Server
                        14. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 93 groups and 290 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 113 groups and 386 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html 2024-05-31 07:52:34.000000000 +0000 @@ -69,7 +69,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCriminal Justice Information Services (CJIS) Security Policy
                      Profile IDxccdf_org.ssgproject.content_profile_cjis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                      2. Services
                        1. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 47 groups and 102 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleUnclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. NFS and RPC
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 50 groups and 103 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Obsolete Services
                        3. Proxy Server
                        4. Network Routing
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 46 groups and 94 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 54 groups and 142 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html 2024-05-31 07:52:34.000000000 +0000 @@ -92,7 +92,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleNIST National Checklist Program Security Guide
                      Profile IDxccdf_org.ssgproject.content_profile_ncp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. LDAP
                        4. NFS and RPC
                        5. Network Time Protocol
                        6. Obsolete Services
                        7. Network Routing
                        8. SSH Server
                        9. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 105 groups and 385 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleOSPP - Protection Profile for General Purpose Operating Systems v4.2.1
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. NFS and RPC
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 50 groups and 103 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 87 groups and 258 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleRHV hardening based on STIG for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_rhelh-stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. LDAP
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. Network Routing
                        9. SSH Server
                        10. System Security Services Daemon
                        11. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 100 groups and 377 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html 2024-05-31 07:52:34.000000000 +0000 @@ -90,7 +90,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleVPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtualization
                      Profile IDxccdf_org.ssgproject.content_profile_rhelh-vpp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. SSH Server
                        2. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 48 groups and 142 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html 2024-05-31 07:52:34.000000000 +0000 @@ -68,7 +68,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleRed Hat Corporate Profile for Certified Cloud Providers (RH CCP)
                      Profile IDxccdf_org.ssgproject.content_profile_rht-ccp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Base Services
                        2. Obsolete Services
                        3. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 38 groups and 68 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. File Permissions and Masks
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 32 groups and 74 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                        10. System Security Services Daemon
                        11. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 103 groups and 281 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -82,7 +82,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. SNMP Server
                        9. SSH Server
                        10. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 101 groups and 280 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 77 groups and 328 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 79 groups and 402 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. LDAP
                        3. Mail Server Software
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. SSH Server
                        7. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 65 groups and 241 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 25 groups and 47 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server
                        18. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 115 groups and 395 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Print Support
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 97 groups and 297 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. Mail Server Software
                        8. NFS and RPC
                        9. Network Time Protocol
                        10. Obsolete Services
                        11. Proxy Server
                        12. Samba(SMB) Microsoft Windows File Sharing Server
                        13. SNMP Server
                        14. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 92 groups and 291 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Proxy Server
                        14. Samba(SMB) Microsoft Windows File Sharing Server
                        15. SNMP Server
                        16. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 112 groups and 389 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleUnclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Kerberos
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. SSH Server
                        8. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 62 groups and 210 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Obsolete Services
                        4. Proxy Server
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 48 groups and 98 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 54 groups and 137 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 @@ -75,7 +75,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) ISM Official
                      Profile IDxccdf_org.ssgproject.content_profile_ism_o

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. Proxy Server
                        6. Network Routing
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 71 groups and 151 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -72,7 +72,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleProtection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Kerberos
                        4. Mail Server Software
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. SSH Server
                        8. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 62 groups and 210 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 85 groups and 256 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. FTP Server
                        4. Kerberos
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Hardware RNG Entropy Gatherer Daemon
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                        13. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 106 groups and 411 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -82,7 +82,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Red Hat Enterprise Linux 8
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8.0
                      • cpe:/o:redhat:enterprise_linux:8.1
                      • cpe:/o:redhat:enterprise_linux:8.10
                      • cpe:/o:redhat:enterprise_linux:8.2
                      • cpe:/o:redhat:enterprise_linux:8.3
                      • cpe:/o:redhat:enterprise_linux:8.4
                      • cpe:/o:redhat:enterprise_linux:8.5
                      • cpe:/o:redhat:enterprise_linux:8.6
                      • cpe:/o:redhat:enterprise_linux:8.7
                      • cpe:/o:redhat:enterprise_linux:8.8
                      • cpe:/o:redhat:enterprise_linux:8.9
                      • cpe:/o:redhat:enterprise_linux:8

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. FTP Server
                        4. Kerberos
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. Hardware RNG Entropy Gatherer Daemon
                        10. SSH Server
                        11. System Security Services Daemon
                        12. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 8   Group contains 104 groups and 407 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (enhanced)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_enhanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                        6. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 74 groups and 315 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (high)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_high

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Kernel Configuration
                        5. Configure Syslog
                        6. Network Configuration and Firewalls
                        7. File Permissions and Masks
                        8. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                        6. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 76 groups and 399 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (intermediary)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_intermediary

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. SSH Server
                        6. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 63 groups and 235 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleANSSI-BP-028 (minimal)
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_bp28_minimal

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. File Permissions and Masks
                      2. Services
                        1. DHCP
                        2. Mail Server Software
                        3. Obsolete Services

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 25 groups and 47 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_advanced.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_advanced.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_advanced.html 2024-05-31 07:52:34.000000000 +0000 @@ -69,7 +69,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCentro Criptológico Nacional (CCN) - STIC for Red Hat Enterprise Linux 9 - Advanced
                      Profile IDxccdf_org.ssgproject.content_profile_ccn_advanced

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DNS Server
                        2. FTP Server
                        3. IMAP and POP3 Server
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. Proxy Server
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 67 groups and 140 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_basic.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_basic.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_basic.html 2024-05-31 07:52:34.000000000 +0000 @@ -69,7 +69,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCentro Criptológico Nacional (CCN) - STIC for Red Hat Enterprise Linux 9 - Basic
                      Profile IDxccdf_org.ssgproject.content_profile_ccn_basic

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                      2. Services
                        1. SSH Server
                        2. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 39 groups and 89 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_intermediate.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_intermediate.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ccn_intermediate.html 2024-05-31 07:52:34.000000000 +0000 @@ -69,7 +69,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCentro Criptológico Nacional (CCN) - STIC for Red Hat Enterprise Linux 9 - Intermediate
                      Profile IDxccdf_org.ssgproject.content_profile_ccn_intermediate

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. DNS Server
                        2. FTP Server
                        3. IMAP and POP3 Server
                        4. Network Time Protocol
                        5. Obsolete Services
                        6. Proxy Server
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 61 groups and 127 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server
                        18. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 112 groups and 360 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Server
                      Profile IDxccdf_org.ssgproject.content_profile_cis_server_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. DNS Server
                        5. FTP Server
                        6. Web Server
                        7. IMAP and POP3 Server
                        8. LDAP
                        9. Mail Server Software
                        10. NFS and RPC
                        11. Network Time Protocol
                        12. Obsolete Services
                        13. Print Support
                        14. Proxy Server
                        15. Samba(SMB) Microsoft Windows File Sharing Server
                        16. SNMP Server
                        17. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 96 groups and 274 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l1

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. LDAP
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Proxy Server
                        13. Samba(SMB) Microsoft Windows File Sharing Server
                        14. SNMP Server
                        15. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 91 groups and 270 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html 2024-05-31 07:52:34.000000000 +0000 @@ -70,7 +70,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleCIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Workstation
                      Profile IDxccdf_org.ssgproject.content_profile_cis_workstation_l2

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Cron and At Daemons
                        2. DHCP
                        3. DNS Server
                        4. FTP Server
                        5. Web Server
                        6. IMAP and POP3 Server
                        7. LDAP
                        8. Mail Server Software
                        9. NFS and RPC
                        10. Network Time Protocol
                        11. Obsolete Services
                        12. Proxy Server
                        13. Samba(SMB) Microsoft Windows File Sharing Server
                        14. SNMP Server
                        15. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 105 groups and 354 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
                      Profile IDxccdf_org.ssgproject.content_profile_cui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. SSH Server
                        5. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 46 groups and 144 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) Essential Eight
                      Profile IDxccdf_org.ssgproject.content_profile_e8

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Obsolete Services
                        4. Proxy Server
                        5. Network Routing
                        6. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 47 groups and 96 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html 2024-05-31 07:52:34.000000000 +0000 @@ -74,7 +74,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleHealth Insurance Portability and Accountability Act (HIPAA)
                      Profile IDxccdf_org.ssgproject.content_profile_hipaa

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. NFS and RPC
                        4. Obsolete Services
                        5. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 51 groups and 131 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html 2024-05-31 07:52:34.000000000 +0000 @@ -75,7 +75,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleAustralian Cyber Security Centre (ACSC) ISM Official
                      Profile IDxccdf_org.ssgproject.content_profile_ism_o

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. Configure Syslog
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. Avahi Server
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. Obsolete Services
                        5. Proxy Server
                        6. Network Routing
                        7. SNMP Server
                        8. SSH Server
                        9. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention
                        3. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 70 groups and 146 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleProtection Profile for General Purpose Operating Systems
                      Profile IDxccdf_org.ssgproject.content_profile_ospp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. zIPL bootloader configuration
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Application Whitelisting Daemon
                        3. Network Time Protocol
                        4. SSH Server
                        5. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Data Retention
                        2. System Accounting with auditd

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 46 groups and 144 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -71,7 +71,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 84 groups and 248 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG for Red Hat Enterprise Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. Application Whitelisting Daemon
                        4. FTP Server
                        5. Kerberos
                        6. Mail Server Software
                        7. NFS and RPC
                        8. Network Time Protocol
                        9. Obsolete Services
                        10. Network Routing
                        11. SSH Server
                        12. System Security Services Daemon
                        13. USBGuard daemon
                        14. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 113 groups and 496 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html 2024-05-31 07:52:34.000000000 +0000 @@ -83,7 +83,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDISA STIG with GUI for Red Hat Enterprise Linux 9
                      Profile IDxccdf_org.ssgproject.content_profile_stig_gui

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:9

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. Application Whitelisting Daemon
                        4. FTP Server
                        5. Kerberos
                        6. Mail Server Software
                        7. NFS and RPC
                        8. Network Time Protocol
                        9. Obsolete Services
                        10. Network Routing
                        11. SSH Server
                        12. System Security Services Daemon
                        13. USBGuard daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 9   Group contains 111 groups and 492 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v3.2.1 Control Baseline for Red Hat Virtualization Host (RHVH)
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8::hypervisor
                      • cpe:/a:redhat:enterprise_virtualization_manager:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. File Permissions and Masks
                      2. Services
                        1. Network Time Protocol
                        2. SSH Server
                        3. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Virtualization 4   Group contains 45 groups and 116 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleDRAFT - DISA STIG for Red Hat Virtualization Host (RHVH)
                      Profile IDxccdf_org.ssgproject.content_profile_rhvh-stig

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8::hypervisor
                      • cpe:/a:redhat:enterprise_virtualization_manager:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                        3. FTP Server
                        4. LDAP
                        5. NFS and RPC
                        6. Network Time Protocol
                        7. Obsolete Services
                        8. Network Routing
                        9. SSH Server
                        10. System Security Services Daemon
                        11. X Window System
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Virtualization 4   Group contains 101 groups and 375 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html 2024-05-31 07:52:34.000000000 +0000 @@ -90,7 +90,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleVPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtualization Host (RHVH)
                      Profile IDxccdf_org.ssgproject.content_profile_rhvh-vpp

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:8::hypervisor
                      • cpe:/a:redhat:enterprise_virtualization_manager:4

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Network Configuration and Firewalls
                        5. File Permissions and Masks
                        6. SELinux
                      2. Services
                        1. SSH Server
                        2. System Security Services Daemon
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Virtualization 4   Group contains 49 groups and 144 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 2024-05-31 07:52:34.000000000 +0000 @@ -80,7 +80,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitlePCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_pci-dss

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:scientificlinux:scientificlinux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. Network Configuration and Firewalls
                        6. File Permissions and Masks
                        7. SELinux
                      2. Services
                        1. Avahi Server
                        2. Cron and At Daemons
                        3. DHCP
                        4. FTP Server
                        5. Mail Server Software
                        6. NFS and RPC
                        7. Network Time Protocol
                        8. Obsolete Services
                        9. SNMP Server
                        10. SSH Server
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing
                        2. Configure auditd Data Retention

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 87 groups and 258 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -76,7 +76,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleStandard System Security Profile for Red Hat Enterprise Linux 7
                      Profile IDxccdf_org.ssgproject.content_profile_standard

                      CPE Platforms

                      • cpe:/o:redhat:enterprise_linux:7::client
                      • cpe:/o:redhat:enterprise_linux:7::computenode
                      • cpe:/o:redhat:enterprise_linux:7::server
                      • cpe:/o:redhat:enterprise_linux:7::workstation
                      • cpe:/o:redhat:enterprise_linux:7
                      • cpe:/o:scientificlinux:scientificlinux:7

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Account and Access Control
                        3. GRUB2 bootloader configuration
                        4. Configure Syslog
                        5. File Permissions and Masks
                      2. Services
                        1. Base Services
                        2. Cron and At Daemons
                      3. System Accounting with auditd
                        1. Configure auditd Rules for Comprehensive Auditing

                      Checklist

                      Group   Guide to the Secure Configuration of Red Hat Enterprise Linux 7   Group contains 32 groups and 74 rules
                      Group   /usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml differs (ASCII text, with very long lines) --- old//usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,4 +1,4 @@ -1DISA STIG for Red Hat Enterprise Linux 7 +1DISA STIG for Red Hat Enterprise Linux 7 This profile contains configuration checks that align to the DISA STIG for Red Hat Enterprise Linux V3R14. /usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml differs (ASCII text, with very long lines) --- old//usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,4 +1,4 @@ -1DISA STIG for Red Hat Enterprise Linux 8 +1DISA STIG for Red Hat Enterprise Linux 8 This profile contains configuration checks that align to the DISA STIG for Red Hat Enterprise Linux 8 V1R14. /usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -53,7 +53,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -53,7 +53,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 8 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -81,7 +81,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 8 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 8 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -37,7 +37,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 9 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -37,7 +37,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 9 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 9 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -49,7 +49,7 @@ - draft + draft Guide to the Secure Configuration of Fedora This guide presents a catalog of security-relevant configuration settings for Fedora. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -49,7 +49,7 @@ - draft + draft Guide to the Secure Configuration of Fedora This guide presents a catalog of security-relevant configuration settings for Fedora. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Fedora This guide presents a catalog of security-relevant configuration settings for Fedora. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 7 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -35,7 +35,7 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 7 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 7 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 8 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -35,7 +35,7 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 8 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 8 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 9 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -35,7 +35,7 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 9 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Oracle Linux 9 This guide presents a catalog of security-relevant configuration settings for Oracle Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -41,7 +41,7 @@ - draft + draft Guide to the Secure Configuration of openEuler 2203 This guide presents a catalog of security-relevant configuration settings for openEuler 2203. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-openeuler2203-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -41,7 +41,7 @@ - draft + draft Guide to the Secure Configuration of openEuler 2203 This guide presents a catalog of security-relevant configuration settings for openEuler 2203. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-openeuler2203-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-openeuler2203-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-openeuler2203-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of openEuler 2203 This guide presents a catalog of security-relevant configuration settings for openEuler 2203. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux CoreOS 4. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux CoreOS 4. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux CoreOS 4. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -49,7 +49,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -49,7 +49,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 8 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -77,7 +77,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 8 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 8 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 8. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 9 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 9 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 9 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 9. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -37,7 +37,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Virtualization 4 This guide presents a catalog of security-relevant configuration settings for Red Hat Virtualization 4. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -37,7 +37,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Virtualization 4 This guide presents a catalog of security-relevant configuration settings for Red Hat Virtualization 4. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Virtualization 4 This guide presents a catalog of security-relevant configuration settings for Red Hat Virtualization 4. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -53,7 +53,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -53,7 +53,7 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Red Hat Enterprise Linux 7 This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of RPMS.2017/scap-security-guide-ubuntu-0.1.73-1.1.noarch.rpm RPMS/scap-security-guide-ubuntu-0.1.73-1.1.noarch.rpm differ: char 225, line 1 Comparing scap-security-guide-ubuntu-0.1.73-1.1.noarch.rpm to scap-security-guide-ubuntu-0.1.73-1.1.noarch.rpm comparing the rpm tags of scap-security-guide-ubuntu --- old-rpm-tags +++ new-rpm-tags @@ -197,4 +197,4 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_average.html ea8fdbab7662a3deab4d7aedc3201cfdf5dbbd273d699212dd32f5ec15d11acc 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_high.html 42656a4240092b8106311748ba5d015f76144540bca1469796fa9f68fcd4785f 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_minimal.html 65778decfeda71d6313a35dfcab1bf1e50d62603876995f6397fd488e85bcbad 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_restrictive.html e946f43d7e36221ae375524c34b482730660328a6296c9da91c33511c2bc1d9d 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_average.html 8b82ae61267bcdf664dac2e8d8a05bea666d143bf0a84da9a4ace1b4dd18da3c 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_high.html 9b71c7a6282ffe54b77f93591e51bc10a42b5f227aceca128441117fbd4b1db8 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_minimal.html 9fea3ed48f0a02c72ec0da8641b88122917f845ed69190426cbf72cc53e1fb43 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_restrictive.html 9ad8f2f12537f6d2ba65c3ecfca950c7a926acaf7901e79fbe2971391729958d 2 @@ -202,6 +202,6 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-standard.html bfb8e5d8cb5ecb58111490c5a8adb13b9a418a68ed342b02e331fd34c49f2510 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_average.html 464342501a1161391a2c466822e307ec819621858db331f8d73f4ca80d6b7a68 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_high.html 9cfb1d5ea035c81daaeb801acc47dae7e15f21aabb471454c54dab936ac42aec 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_minimal.html db9327212c274361f273ac4868876268acd4e541e82a743a9ca8cf4d49dbab19 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_restrictive.html c06a0a1d950d607fdf81b7c72e37efabd45218c41bc25de7a45af0951d4c7dc6 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-cis.html b5646b1dfcb13baa5f6339e704f8ef4a64a0e444cabd5b1c8c1a5ad53ba2b705 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-standard.html dd04e678f5629ba02c3cb60eac2be092e5106930b386ca06fa26890bc9229daf 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_average.html 3d2b1277f87f0d8d1bc5c6b10a51b82e264e47e53792b65365e4997aaade6009 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_high.html 3e56544a3b2d19b94afd9d5bc29b8e4d3a90f9ee7e127ca26e79c72f693718d9 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_minimal.html b0f418465a8537e7c138c271c4f73df7b790a989a6f68118fca741527bfe7c81 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_restrictive.html 91c77effca1445e2f354c21a26a6e4a13e273c556e89c497af08ffe43c30cd0c 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-cis.html 53e1a8454756582cb8a51c02285e65228d42fc7211a85ba2a3b269e0dd0fcf8a 2 @@ -209,5 +209,5 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-standard.html 63c54e44d525c3c418f7befb7473760fb01fe4dc4b8ea36840aaf2b6ae6069f4 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_server.html ac5d1f3a50a11f7e2a42324031c1991db59725eee76161080b464fc346739978 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_workstation.html e68a6b5564db90c351fec57cda02378ad1b68b10f36527d257809d63dfd4166e 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_server.html 8a59d2bdf555b4d5effa71ea22dbbc40ef890db2771f4fcce3e7a6a6884e8d17 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_workstation.html 44d0f2f53f4370bd0525f19f235a6fd329bb093cd9a5c5f7c421d2c9f37c0c20 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-standard.html d21fe8ba86eea41ebd21a671ab190ffbe2e1aa40655981715927267ec271c6c6 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_server.html 24a4ff24a8e94347510094ea41f0a00ac0a958b3dc620f8de653c95d799e3c80 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_workstation.html 0b3069f5b45cbdc0fe0587414c3474e1ad433f38c0fa9607faab4ed3e177be9e 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_server.html 25cdd3ca88b3f7080be4f86d8b23c5d54155d5a62b2db7f74cdcb66eb174e94a 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_workstation.html 3b10acdcddd1785d25c818e71de4abef8e18774c1fedd6f2ee88a133ac180b99 2 @@ -215,6 +215,6 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-standard.html f7ae44d04ae89260b45c0551a7d068405b6ade355425c9a591f17a97486a2dae 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-stig.html 2a2b1d053a2689ffdba7ee1d63e8da6fe1a4556f6ff6772ec1debac7d46ce396 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_server.html 8b9cdcc10feb3114b171298e93cb46cd2f246ddc7decfb81c3b0b5e6ed050270 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_workstation.html 54715054d61d88804c62e2be4f7bc264aa4c1b28eb464133e12dd87554a5b3d5 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_server.html d94aa34d201258a3acb190473f1b4b12663a40d691351bd41fec34ab739673ad 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_workstation.html 3ad036a6f4ef6534ee6cdb4afdb0de2d37f873227940fd7bd4838a1f05efccfc 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-standard.html 2129c43d8b8780483d86d8a10a580ccbf15d5f274f3191a0fc5bac30a3bb2d3e 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-stig.html 94215770886fcf67bd9edd5eb2201bff890e16db55754009365afe5500b160e4 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_server.html 49b8bf60cc57ae01e58bd3e4e318cccd01297883e89aaa64177668a8c0e5c2d3 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_workstation.html 38703d19bedec8507cb1caec082686d7b2884e7a27665e4564fd2122fe08dc21 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_server.html 902ce56f328a9d92124e235d9dfc989a31e20a924b8c7f23a5cb6cbeff836757 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_workstation.html c4b418c87037a22c441d4a8253595da29de6bbb0356480bc04fcc6cab8a2b53d 2 @@ -222,2 +222,2 @@ -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-standard.html 4787a47269c2280355dd29a30ff348a76ebb58fe59be23fd60104a97056ff447 2 -/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-stig.html 67a7359e05bec6851386457be4d8d27e7825bd3a9b2df8b9d880530cd5d88f2c 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-standard.html 35f4dca7de05a928ac8965558815710cdfa3b4719cfae2bbbc6bd2ec45e27a07 2 +/usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-stig.html 29eaf108df80d1ee368651c8a31ae52d863bd1f693b26e89dc5476f427cd0894 2 @@ -282,2 +282,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds-1.2.xml ab4f975995b88e53641a4d14f4c723717c80e0177ee0880c468ad36edd29129a 0 -/usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds.xml f6796d0bff8a2ab65e6d3d48c964747e78eb62d66b3868fc20279e5ce000b2e6 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds-1.2.xml 67a0a80276e6af7f21e0d073db8c78ebb47bc57923ecdd048f81f1e173f9c50f 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds.xml 7ff997a51783405c8f82f88874fea4237d12f9bc09abb7a894cff349334ead44 0 @@ -286 +286 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu1604-xccdf.xml 016f8b44b23f566f1fd5f3013103e7551e08c1f72691dce9a5b0e4f117dae3ef 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu1604-xccdf.xml 10afff67757e60104b7949960235bb3eabc1abcea01935d95694836ff1bb3762 0 @@ -289,2 +289,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds-1.2.xml d03100e564d03aaf574dbc965a466f677bb70655229af6181a13018a1aed2c7a 0 -/usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds.xml b62e13bd2701535c6f83f1e17aeeed9f86e22510885033d768d67e04ff20bd42 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds-1.2.xml d30b226a5f66b7c96b6b94b242d74cec1c9016870d481014d4bae6bdacc74796 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds.xml 1251b3a6a1f1b27640193f41f0b2269e12326ac7b6d86fab29929c4155efe6c6 0 @@ -293 +293 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu1804-xccdf.xml b244483c9abba5dcb2e76bb8e74c740d72d502958458fdc3cb0471d41bbe9364 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu1804-xccdf.xml 942e772cfe9e24ca2bbdef514a710f2b62390cdc4a8701b2a400c5df42808368 0 @@ -296,2 +296,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds-1.2.xml 339c16fe465096dcdd892e5c349febca2a4d701491a7102fc3fc088cd573bdf9 0 -/usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds.xml f120a1bc1a26478f673a635fb5e306fbc299e564a2990e3dcd3e896ceccd9a2b 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds-1.2.xml d86e10247b0ac2dabb68a7c8519eb0a5619db3c6b9c14e13f553a89a3dd1dc75 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds.xml deaee9cf6177b306e393ec474732485eb4b9224c58cc7eca4c32141a001186e9 0 @@ -300 +300 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu2004-xccdf.xml 2ac72bdeab9e57073cd3ef029d8b5e5e74503a424a100e0051fa85e89025093a 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu2004-xccdf.xml 2b28980b1b5f0523efd91c7a00c76f60be344536fb50d8ae9130cf52bf14bde9 0 @@ -303,2 +303,2 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds-1.2.xml 0e3ee95072b432780f20433d7a929514791babd88789d88932e8b32826aeb3e0 0 -/usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds.xml c30742f3e1507cfa76cbeb7212ee5ece384fe92db5a5eb96afb9eca02bbd45a1 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds-1.2.xml fef118a54d51b172728a19e31b97a5db955925826880991b69fecedeb25d57ee 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds.xml 2270b55b0cb44816e7df9518ad748362946a46a6813a16361e10e44dfc93fe5d 0 @@ -307 +307 @@ -/usr/share/xml/scap/ssg/content/ssg-ubuntu2204-xccdf.xml 637c759c3d37c7d5eacec5eafc166b99849ca2c378f5d428003b6ef4f3531c9c 0 +/usr/share/xml/scap/ssg/content/ssg-ubuntu2204-xccdf.xml 01ec6802dfd822bb6d71848955369550901bf286e0837d87c3a4aeb8afe8781c 0 comparing rpmtags comparing RELEASE comparing PROVIDES comparing scripts comparing filelist comparing file checksum creating rename script RPM file checksum differs. Extracting packages /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_average.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleProfile for ANSSI DAT-NT28 Average (Intermediate) Level
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_average

                      CPE Platforms

                      • cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. Configure Syslog
                        3. File Permissions and Masks
                      2. Services
                        1. APT service configuration
                        2. Deprecated services
                        3. Network Time Protocol
                        4. SSH Server

                      Checklist

                      Group   Guide to the Secure Configuration of Ubuntu 16.04   Group contains 19 groups and 40 rules
                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                      Profile Information

                      Profile TitleProfile for ANSSI DAT-NT28 High (Enforced) Level
                      Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_high

                      CPE Platforms

                      • cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~

                      Revision History

                      Current version: 0.1.73

                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                      Table of Contents

                      1. System Settings
                        1. Installing and Maintaining Software
                        2. GRUB2 bootloader configuration
                        3. Configure Syslog
                        4. File Permissions and Masks
                      2. Services
                        1. APT service configuration
                        2. Cron and At Daemons
                        3. Deprecated services
                        4. Network Time Protocol
                        5. SSH Server
                      3. System Accounting with auditd

                        Checklist

                        Group   Guide to the Secure Configuration of Ubuntu 16.04   Group contains 22 groups and 46 rules
                        Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                        Profile Information

                        Profile TitleProfile for ANSSI DAT-NT28 Minimal Level
                        Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_minimal

                        CPE Platforms

                        • cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~

                        Revision History

                        Current version: 0.1.73

                        • draft - (as of 2024-06-03) + (as of 2040-07-06)

                        Table of Contents

                        1. System Settings
                          1. Installing and Maintaining Software
                          2. File Permissions and Masks
                        2. Services
                          1. APT service configuration
                          2. Deprecated services

                        Checklist

                        Group   Guide to the Secure Configuration of Ubuntu 16.04   Group contains 9 groups and 19 rules
                        Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_restrictive.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                        Profile Information

                        Profile TitleProfile for ANSSI DAT-NT28 Restrictive Level
                        Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_restrictive

                        CPE Platforms

                        • cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~

                        Revision History

                        Current version: 0.1.73

                        • draft - (as of 2024-06-03) + (as of 2040-07-06)

                        Table of Contents

                        1. System Settings
                          1. Installing and Maintaining Software
                          2. Configure Syslog
                          3. File Permissions and Masks
                        2. Services
                          1. APT service configuration
                          2. Cron and At Daemons
                          3. Deprecated services
                          4. Network Time Protocol
                          5. SSH Server
                        3. System Accounting with auditd

                          Checklist

                          Group   Guide to the Secure Configuration of Ubuntu 16.04   Group contains 21 groups and 45 rules
                          Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1604-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                          Profile Information

                          Profile TitleStandard System Security Profile for Ubuntu 16.04
                          Profile IDxccdf_org.ssgproject.content_profile_standard

                          CPE Platforms

                          • cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~

                          Revision History

                          Current version: 0.1.73

                          • draft - (as of 2024-06-03) + (as of 2040-07-06)

                          Table of Contents

                          1. System Settings
                            1. Installing and Maintaining Software
                            2. Configure Syslog
                            3. File Permissions and Masks
                          2. Services
                            1. Cron and At Daemons
                            2. Deprecated services
                            3. Network Time Protocol
                            4. SSH Server
                          3. System Accounting with auditd

                            Checklist

                            Group   Guide to the Secure Configuration of Ubuntu 16.04   Group contains 19 groups and 45 rules
                            Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_average.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_average.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                            Profile Information

                            Profile TitleProfile for ANSSI DAT-NT28 Average (Intermediate) Level
                            Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_average

                            CPE Platforms

                            • cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~

                            Revision History

                            Current version: 0.1.73

                            • draft - (as of 2024-06-03) + (as of 2040-07-06)

                            Table of Contents

                            1. System Settings
                              1. Installing and Maintaining Software
                              2. Configure Syslog
                              3. File Permissions and Masks
                            2. Services
                              1. APT service configuration
                              2. Deprecated services
                              3. Network Time Protocol
                              4. SSH Server

                            Checklist

                            Group   Guide to the Secure Configuration of Ubuntu 18.04   Group contains 19 groups and 40 rules
                            Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_high.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                            Profile Information

                            Profile TitleProfile for ANSSI DAT-NT28 High (Enforced) Level
                            Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_high

                            CPE Platforms

                            • cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~

                            Revision History

                            Current version: 0.1.73

                            • draft - (as of 2024-06-03) + (as of 2040-07-06)

                            Table of Contents

                            1. System Settings
                              1. Installing and Maintaining Software
                              2. GRUB2 bootloader configuration
                              3. Configure Syslog
                              4. File Permissions and Masks
                            2. Services
                              1. APT service configuration
                              2. Cron and At Daemons
                              3. Deprecated services
                              4. Network Time Protocol
                              5. SSH Server
                            3. System Accounting with auditd

                              Checklist

                              Group   Guide to the Secure Configuration of Ubuntu 18.04   Group contains 22 groups and 46 rules
                              Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_minimal.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                              Profile Information

                              Profile TitleProfile for ANSSI DAT-NT28 Minimal Level
                              Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_minimal

                              CPE Platforms

                              • cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~

                              Revision History

                              Current version: 0.1.73

                              • draft - (as of 2024-06-03) + (as of 2040-07-06)

                              Table of Contents

                              1. System Settings
                                1. Installing and Maintaining Software
                                2. File Permissions and Masks
                              2. Services
                                1. APT service configuration
                                2. Deprecated services

                              Checklist

                              Group   Guide to the Secure Configuration of Ubuntu 18.04   Group contains 9 groups and 19 rules
                              Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_restrictive.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-anssi_np_nt28_restrictive.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                              Profile Information

                              Profile TitleProfile for ANSSI DAT-NT28 Restrictive Level
                              Profile IDxccdf_org.ssgproject.content_profile_anssi_np_nt28_restrictive

                              CPE Platforms

                              • cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~

                              Revision History

                              Current version: 0.1.73

                              • draft - (as of 2024-06-03) + (as of 2040-07-06)

                              Table of Contents

                              1. System Settings
                                1. Installing and Maintaining Software
                                2. Configure Syslog
                                3. File Permissions and Masks
                              2. Services
                                1. APT service configuration
                                2. Cron and At Daemons
                                3. Deprecated services
                                4. Network Time Protocol
                                5. SSH Server
                              3. System Accounting with auditd

                                Checklist

                                Group   Guide to the Secure Configuration of Ubuntu 18.04   Group contains 21 groups and 45 rules
                                Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-cis.html 2024-05-31 07:52:34.000000000 +0000 @@ -67,7 +67,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                Profile Information

                                Profile TitleCIS Ubuntu 18.04 LTS Benchmark
                                Profile IDxccdf_org.ssgproject.content_profile_cis

                                CPE Platforms

                                • cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~

                                Revision History

                                Current version: 0.1.73

                                • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                Table of Contents

                                1. System Settings
                                  1. Installing and Maintaining Software
                                  2. Network Configuration and Firewalls
                                  3. File Permissions and Masks
                                2. Services
                                  1. SSH Server
                                3. System Accounting with auditd
                                  1. Configure auditd Rules for Comprehensive Auditing
                                  2. Configure auditd Data Retention

                                Checklist

                                Group   Guide to the Secure Configuration of Ubuntu 18.04   Group contains 21 groups and 71 rules
                                Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu1804-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                Profile Information

                                Profile TitleStandard System Security Profile for Ubuntu 18.04
                                Profile IDxccdf_org.ssgproject.content_profile_standard

                                CPE Platforms

                                • cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~

                                Revision History

                                Current version: 0.1.73

                                • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                Table of Contents

                                1. System Settings
                                  1. Installing and Maintaining Software
                                  2. Configure Syslog
                                  3. File Permissions and Masks
                                2. Services
                                  1. Cron and At Daemons
                                  2. Deprecated services
                                  3. Network Time Protocol
                                  4. SSH Server
                                3. System Accounting with auditd

                                  Checklist

                                  Group   Guide to the Secure Configuration of Ubuntu 18.04   Group contains 19 groups and 45 rules
                                  Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_server.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_server.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_server.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                  Profile Information

                                  Profile TitleCIS Ubuntu 20.04 Level 1 Server Benchmark
                                  Profile IDxccdf_org.ssgproject.content_profile_cis_level1_server

                                  CPE Platforms

                                  • cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~

                                  Revision History

                                  Current version: 0.1.73

                                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                  Table of Contents

                                  1. System Settings
                                    1. Installing and Maintaining Software
                                    2. Account and Access Control
                                    3. AppArmor
                                    4. GRUB2 bootloader configuration
                                    5. Configure Syslog
                                    6. Network Configuration and Firewalls
                                    7. File Permissions and Masks
                                  2. Services
                                    1. Avahi Server
                                    2. Cron and At Daemons
                                    3. Deprecated services
                                    4. DHCP
                                    5. DNS Server
                                    6. FTP Server
                                    7. Web Server
                                    8. IMAP and POP3 Server
                                    9. LDAP
                                    10. Mail Server Software
                                    11. NFS and RPC
                                    12. Network Time Protocol
                                    13. Obsolete Services
                                    14. Print Support
                                    15. Proxy Server
                                    16. Samba(SMB) Microsoft Windows File Sharing Server
                                    17. SNMP Server
                                    18. SSH Server
                                    19. X Window System

                                  Checklist

                                  Group   Guide to the Secure Configuration of Ubuntu 20.04   Group contains 93 groups and 260 rules
                                  Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_workstation.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_workstation.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level1_workstation.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                  Profile Information

                                  Profile TitleCIS Ubuntu 20.04 Level 1 Workstation Benchmark
                                  Profile IDxccdf_org.ssgproject.content_profile_cis_level1_workstation

                                  CPE Platforms

                                  • cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~

                                  Revision History

                                  Current version: 0.1.73

                                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                  Table of Contents

                                  1. System Settings
                                    1. Installing and Maintaining Software
                                    2. Account and Access Control
                                    3. AppArmor
                                    4. GRUB2 bootloader configuration
                                    5. Configure Syslog
                                    6. Network Configuration and Firewalls
                                    7. File Permissions and Masks
                                  2. Services
                                    1. Avahi Server
                                    2. Cron and At Daemons
                                    3. Deprecated services
                                    4. DHCP
                                    5. DNS Server
                                    6. FTP Server
                                    7. Web Server
                                    8. IMAP and POP3 Server
                                    9. LDAP
                                    10. Mail Server Software
                                    11. NFS and RPC
                                    12. Network Time Protocol
                                    13. Obsolete Services
                                    14. Print Support
                                    15. Proxy Server
                                    16. Samba(SMB) Microsoft Windows File Sharing Server
                                    17. SNMP Server
                                    18. SSH Server

                                  Checklist

                                  Group   Guide to the Secure Configuration of Ubuntu 20.04   Group contains 91 groups and 259 rules
                                  Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_server.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_server.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_server.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                  Profile Information

                                  Profile TitleCIS Ubuntu 20.04 Level 2 Server Benchmark
                                  Profile IDxccdf_org.ssgproject.content_profile_cis_level2_server

                                  CPE Platforms

                                  • cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~

                                  Revision History

                                  Current version: 0.1.73

                                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                  Table of Contents

                                  1. System Settings
                                    1. Installing and Maintaining Software
                                    2. Account and Access Control
                                    3. AppArmor
                                    4. GRUB2 bootloader configuration
                                    5. Configure Syslog
                                    6. Network Configuration and Firewalls
                                    7. File Permissions and Masks
                                  2. Services
                                    1. Avahi Server
                                    2. Cron and At Daemons
                                    3. Deprecated services
                                    4. DHCP
                                    5. DNS Server
                                    6. FTP Server
                                    7. Web Server
                                    8. IMAP and POP3 Server
                                    9. LDAP
                                    10. Mail Server Software
                                    11. NFS and RPC
                                    12. Network Time Protocol
                                    13. Obsolete Services
                                    14. Print Support
                                    15. Proxy Server
                                    16. Samba(SMB) Microsoft Windows File Sharing Server
                                    17. SNMP Server
                                    18. SSH Server
                                    19. X Window System
                                  3. System Accounting with auditd
                                    1. Configure auditd Rules for Comprehensive Auditing
                                    2. Configure auditd Data Retention

                                  Checklist

                                  Group   Guide to the Secure Configuration of Ubuntu 20.04   Group contains 104 groups and 345 rules
                                  Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_workstation.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_workstation.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-cis_level2_workstation.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                  Profile Information

                                  Profile TitleCIS Ubuntu 20.04 Level 2 Workstation Benchmark
                                  Profile IDxccdf_org.ssgproject.content_profile_cis_level2_workstation

                                  CPE Platforms

                                  • cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~

                                  Revision History

                                  Current version: 0.1.73

                                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                  Table of Contents

                                  1. System Settings
                                    1. Installing and Maintaining Software
                                    2. Account and Access Control
                                    3. AppArmor
                                    4. GRUB2 bootloader configuration
                                    5. Configure Syslog
                                    6. Network Configuration and Firewalls
                                    7. File Permissions and Masks
                                  2. Services
                                    1. Avahi Server
                                    2. Cron and At Daemons
                                    3. Deprecated services
                                    4. DHCP
                                    5. DNS Server
                                    6. FTP Server
                                    7. Web Server
                                    8. IMAP and POP3 Server
                                    9. LDAP
                                    10. Mail Server Software
                                    11. NFS and RPC
                                    12. Network Time Protocol
                                    13. Obsolete Services
                                    14. Print Support
                                    15. Proxy Server
                                    16. Samba(SMB) Microsoft Windows File Sharing Server
                                    17. SNMP Server
                                    18. SSH Server
                                  3. System Accounting with auditd
                                    1. Configure auditd Rules for Comprehensive Auditing
                                    2. Configure auditd Data Retention

                                  Checklist

                                  Group   Guide to the Secure Configuration of Ubuntu 20.04   Group contains 104 groups and 347 rules
                                  Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                  Profile Information

                                  Profile TitleStandard System Security Profile for Ubuntu 20.04
                                  Profile IDxccdf_org.ssgproject.content_profile_standard

                                  CPE Platforms

                                  • cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~

                                  Revision History

                                  Current version: 0.1.73

                                  • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                  Table of Contents

                                  1. System Settings
                                    1. Installing and Maintaining Software
                                    2. Account and Access Control
                                    3. Configure Syslog
                                    4. File Permissions and Masks
                                  2. Services
                                    1. Apport Service
                                    2. Cron and At Daemons
                                    3. Deprecated services
                                    4. Network Time Protocol
                                    5. SSH Server
                                  3. System Accounting with auditd

                                    Checklist

                                    Group   Guide to the Secure Configuration of Ubuntu 20.04   Group contains 22 groups and 45 rules
                                    Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2004-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -68,7 +68,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                    Profile Information

                                    Profile TitleCanonical Ubuntu 20.04 LTS Security Technical Implementation Guide (STIG) V1R9
                                    Profile IDxccdf_org.ssgproject.content_profile_stig

                                    CPE Platforms

                                    • cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~

                                    Revision History

                                    Current version: 0.1.73

                                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                    Table of Contents

                                    1. System Settings
                                      1. Installing and Maintaining Software
                                      2. Account and Access Control
                                      3. AppArmor
                                      4. GRUB2 bootloader configuration
                                      5. Configure Syslog
                                      6. Network Configuration and Firewalls
                                      7. File Permissions and Masks
                                    2. Services
                                      1. APT service configuration
                                      2. Base Services
                                      3. Deprecated services
                                      4. Network Time Protocol
                                      5. Obsolete Services
                                      6. SSH Server
                                      7. System Security Services Daemon
                                    3. System Accounting with auditd
                                      1. Configure auditd Rules for Comprehensive Auditing
                                      2. Configure auditd Data Retention

                                    Checklist

                                    Group   Guide to the Secure Configuration of Ubuntu 20.04   Group contains 76 groups and 203 rules
                                    Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_server.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_server.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_server.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                    Profile Information

                                    Profile TitleCIS Ubuntu 22.04 Level 1 Server Benchmark
                                    Profile IDxccdf_org.ssgproject.content_profile_cis_level1_server

                                    CPE Platforms

                                    • cpe:/o:canonical:ubuntu_linux:22.04::~~lts~~~

                                    Revision History

                                    Current version: 0.1.73

                                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                    Table of Contents

                                    1. System Settings
                                      1. Installing and Maintaining Software
                                      2. Account and Access Control
                                      3. AppArmor
                                      4. GRUB2 bootloader configuration
                                      5. Configure Syslog
                                      6. Network Configuration and Firewalls
                                      7. File Permissions and Masks
                                    2. Services
                                      1. Apport Service
                                      2. Avahi Server
                                      3. Cron and At Daemons
                                      4. Deprecated services
                                      5. DHCP
                                      6. DNS Server
                                      7. FTP Server
                                      8. Web Server
                                      9. IMAP and POP3 Server
                                      10. LDAP
                                      11. Mail Server Software
                                      12. NFS and RPC
                                      13. Network Time Protocol
                                      14. Obsolete Services
                                      15. Print Support
                                      16. Proxy Server
                                      17. Samba(SMB) Microsoft Windows File Sharing Server
                                      18. SNMP Server
                                      19. SSH Server
                                      20. X Window System
                                    3. System Accounting with auditd
                                      1. Configure auditd Rules for Comprehensive Auditing

                                    Checklist

                                    Group   Guide to the Secure Configuration of Ubuntu 22.04   Group contains 102 groups and 291 rules
                                    Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_workstation.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_workstation.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level1_workstation.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                    Profile Information

                                    Profile TitleCIS Ubuntu 22.04 Level 1 Workstation Benchmark
                                    Profile IDxccdf_org.ssgproject.content_profile_cis_level1_workstation

                                    CPE Platforms

                                    • cpe:/o:canonical:ubuntu_linux:22.04::~~lts~~~

                                    Revision History

                                    Current version: 0.1.73

                                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                    Table of Contents

                                    1. System Settings
                                      1. Installing and Maintaining Software
                                      2. Account and Access Control
                                      3. AppArmor
                                      4. GRUB2 bootloader configuration
                                      5. Configure Syslog
                                      6. Network Configuration and Firewalls
                                      7. File Permissions and Masks
                                    2. Services
                                      1. Apport Service
                                      2. Avahi Server
                                      3. Cron and At Daemons
                                      4. Deprecated services
                                      5. DHCP
                                      6. DNS Server
                                      7. FTP Server
                                      8. Web Server
                                      9. IMAP and POP3 Server
                                      10. LDAP
                                      11. Mail Server Software
                                      12. NFS and RPC
                                      13. Network Time Protocol
                                      14. Obsolete Services
                                      15. Proxy Server
                                      16. Samba(SMB) Microsoft Windows File Sharing Server
                                      17. SNMP Server
                                      18. SSH Server
                                    3. System Accounting with auditd
                                      1. Configure auditd Rules for Comprehensive Auditing

                                    Checklist

                                    Group   Guide to the Secure Configuration of Ubuntu 22.04   Group contains 97 groups and 284 rules
                                    Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_server.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_server.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_server.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                    Profile Information

                                    Profile TitleCIS Ubuntu 22.04 Level 2 Server Benchmark
                                    Profile IDxccdf_org.ssgproject.content_profile_cis_level2_server

                                    CPE Platforms

                                    • cpe:/o:canonical:ubuntu_linux:22.04::~~lts~~~

                                    Revision History

                                    Current version: 0.1.73

                                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                    Table of Contents

                                    1. System Settings
                                      1. Installing and Maintaining Software
                                      2. Account and Access Control
                                      3. AppArmor
                                      4. GRUB2 bootloader configuration
                                      5. Configure Syslog
                                      6. Network Configuration and Firewalls
                                      7. File Permissions and Masks
                                    2. Services
                                      1. Apport Service
                                      2. Avahi Server
                                      3. Cron and At Daemons
                                      4. Deprecated services
                                      5. DHCP
                                      6. DNS Server
                                      7. FTP Server
                                      8. Web Server
                                      9. IMAP and POP3 Server
                                      10. LDAP
                                      11. Mail Server Software
                                      12. NFS and RPC
                                      13. Network Time Protocol
                                      14. Obsolete Services
                                      15. Print Support
                                      16. Proxy Server
                                      17. Samba(SMB) Microsoft Windows File Sharing Server
                                      18. SNMP Server
                                      19. SSH Server
                                      20. X Window System
                                    3. System Accounting with auditd
                                      1. Configure auditd Rules for Comprehensive Auditing
                                      2. Configure auditd Data Retention

                                    Checklist

                                    Group   Guide to the Secure Configuration of Ubuntu 22.04   Group contains 113 groups and 386 rules
                                    Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_workstation.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_workstation.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-cis_level2_workstation.html 2024-05-31 07:52:34.000000000 +0000 @@ -66,7 +66,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                    Profile Information

                                    Profile TitleCIS Ubuntu 22.04 Level 2 Workstation Benchmark
                                    Profile IDxccdf_org.ssgproject.content_profile_cis_level2_workstation

                                    CPE Platforms

                                    • cpe:/o:canonical:ubuntu_linux:22.04::~~lts~~~

                                    Revision History

                                    Current version: 0.1.73

                                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                    Table of Contents

                                    1. System Settings
                                      1. Installing and Maintaining Software
                                      2. Account and Access Control
                                      3. AppArmor
                                      4. GRUB2 bootloader configuration
                                      5. Configure Syslog
                                      6. Network Configuration and Firewalls
                                      7. File Permissions and Masks
                                    2. Services
                                      1. Apport Service
                                      2. Avahi Server
                                      3. Cron and At Daemons
                                      4. Deprecated services
                                      5. DHCP
                                      6. DNS Server
                                      7. FTP Server
                                      8. Web Server
                                      9. IMAP and POP3 Server
                                      10. LDAP
                                      11. Mail Server Software
                                      12. NFS and RPC
                                      13. Network Time Protocol
                                      14. Obsolete Services
                                      15. Print Support
                                      16. Proxy Server
                                      17. Samba(SMB) Microsoft Windows File Sharing Server
                                      18. SNMP Server
                                      19. SSH Server
                                    3. System Accounting with auditd
                                      1. Configure auditd Rules for Comprehensive Auditing
                                      2. Configure auditd Data Retention

                                    Checklist

                                    Group   Guide to the Secure Configuration of Ubuntu 22.04   Group contains 111 groups and 384 rules
                                    Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-standard.html 2024-05-31 07:52:34.000000000 +0000 @@ -65,7 +65,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                    Profile Information

                                    Profile TitleStandard System Security Profile for Ubuntu 22.04
                                    Profile IDxccdf_org.ssgproject.content_profile_standard

                                    CPE Platforms

                                    • cpe:/o:canonical:ubuntu_linux:22.04::~~lts~~~

                                    Revision History

                                    Current version: 0.1.73

                                    • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                    Table of Contents

                                    1. System Settings
                                      1. Installing and Maintaining Software
                                      2. Account and Access Control
                                      3. Configure Syslog
                                      4. File Permissions and Masks
                                    2. Services
                                      1. Apport Service
                                      2. Cron and At Daemons
                                      3. Deprecated services
                                      4. Network Time Protocol
                                      5. SSH Server
                                    3. System Accounting with auditd

                                      Checklist

                                      Group   Guide to the Secure Configuration of Ubuntu 22.04   Group contains 22 groups and 45 rules
                                      Group   /usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines) --- old//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/doc/scap-security-guide/guides/ssg-ubuntu2204-guide-stig.html 2024-05-31 07:52:34.000000000 +0000 @@ -68,7 +68,7 @@ other parties, and makes no guarantees, expressed or implied, about its quality, reliability, or any other characteristic.

                                      Profile Information

                                      Profile TitleDRAFT Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide (STIG) DRAFT
                                      Profile IDxccdf_org.ssgproject.content_profile_stig

                                      CPE Platforms

                                      • cpe:/o:canonical:ubuntu_linux:22.04::~~lts~~~

                                      Revision History

                                      Current version: 0.1.73

                                      • draft - (as of 2024-06-03) + (as of 2040-07-06)

                                      Table of Contents

                                      1. System Settings
                                        1. Installing and Maintaining Software
                                        2. Account and Access Control
                                        3. AppArmor
                                        4. GRUB2 bootloader configuration
                                        5. Configure Syslog
                                        6. Network Configuration and Firewalls
                                        7. File Permissions and Masks
                                      2. Services
                                        1. APT service configuration
                                        2. Base Services
                                        3. Deprecated services
                                        4. Network Time Protocol
                                        5. Obsolete Services
                                        6. SSH Server
                                        7. System Security Services Daemon
                                      3. System Accounting with auditd
                                        1. Configure auditd Rules for Comprehensive Auditing
                                        2. Configure auditd Data Retention

                                      Checklist

                                      Group   Guide to the Secure Configuration of Ubuntu 22.04   Group contains 74 groups and 207 rules
                                      Group   /usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 16.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 16.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu1604-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -35,7 +35,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 16.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 16.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu1604-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu1604-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu1604-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 16.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 16.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 18.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 18.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 18.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 18.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu1804-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu1804-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu1804-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 18.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 18.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 20.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 20.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu2004-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 20.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 20.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu2004-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu2004-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu2004-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 20.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 20.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds-1.2.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds-1.2.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 22.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 22.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds.xml differs (XML 1.0 document, UTF-8 Unicode text, with very long lines) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu2204-ds.xml 2024-05-31 07:52:34.000000000 +0000 @@ -33,7 +33,7 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 22.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 22.04. It is a rendering of /usr/share/xml/scap/ssg/content/ssg-ubuntu2204-xccdf.xml differs (XML 1.0 document text) --- old//usr/share/xml/scap/ssg/content/ssg-ubuntu2204-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 +++ new//usr/share/xml/scap/ssg/content/ssg-ubuntu2204-xccdf.xml 2024-05-31 07:52:34.000000000 +0000 @@ -1,6 +1,6 @@ - draft + draft Guide to the Secure Configuration of Ubuntu 22.04 This guide presents a catalog of security-relevant configuration settings for Ubuntu 22.04. It is a rendering of overalldiffered=4 (number of pkgs that are not bit-by-bit identical: 0 is good) overall=1