diff --git a/SOURCES/0001-Add-AlmaLinux-8-support.patch b/SOURCES/0001-Add-AlmaLinux-8-support.patch index 0902f7f..7dadece 100644 --- a/SOURCES/0001-Add-AlmaLinux-8-support.patch +++ b/SOURCES/0001-Add-AlmaLinux-8-support.patch @@ -30441,7 +30441,7 @@ index 00000000..2e8a33d3 + - audit_rules_usergroup_modification_shadow diff --git a/products/almalinux8/profiles/ism_o.profile b/products/almalinux8/profiles/ism_o.profile new file mode 100644 -index 00000000..2a281cdc +index 00000000..c1af5712 --- /dev/null +++ b/products/almalinux8/profiles/ism_o.profile @@ -0,0 +1,135 @@ @@ -30458,12 +30458,12 @@ index 00000000..2a281cdc +title: 'Australian Cyber Security Centre (ACSC) ISM Official' + +description: |- -+ This profile contains configuration checks for AlmaLinux 8 ++ This profile contains configuration checks for AlmaLinux OS 8 + that align to the Australian Cyber Security Centre (ACSC) Information Security Manual (ISM) + with the applicability marking of OFFICIAL. + + The ISM uses a risk-based approach to cyber security. This profile provides a guide to aligning -+ Red Hat Enterprise Linux security controls with the ISM, which can be used to select controls ++ AlmaLinux OS security controls with the ISM, which can be used to select controls + specific to an organisation's security posture and risk profile. + + A copy of the ISM can be found at the ACSC website: