Update AlmaLinux patch

This commit is contained in:
Andrew Lukoshko 2022-05-03 11:20:14 +00:00
parent c085c65ede
commit ded0879b35

View File

@ -30441,7 +30441,7 @@ index 00000000..2e8a33d3
+ - audit_rules_usergroup_modification_shadow + - audit_rules_usergroup_modification_shadow
diff --git a/products/almalinux8/profiles/ism_o.profile b/products/almalinux8/profiles/ism_o.profile diff --git a/products/almalinux8/profiles/ism_o.profile b/products/almalinux8/profiles/ism_o.profile
new file mode 100644 new file mode 100644
index 00000000..2a281cdc index 00000000..c1af5712
--- /dev/null --- /dev/null
+++ b/products/almalinux8/profiles/ism_o.profile +++ b/products/almalinux8/profiles/ism_o.profile
@@ -0,0 +1,135 @@ @@ -0,0 +1,135 @@
@ -30458,12 +30458,12 @@ index 00000000..2a281cdc
+title: 'Australian Cyber Security Centre (ACSC) ISM Official' +title: 'Australian Cyber Security Centre (ACSC) ISM Official'
+ +
+description: |- +description: |-
+ This profile contains configuration checks for AlmaLinux 8 + This profile contains configuration checks for AlmaLinux OS 8
+ that align to the Australian Cyber Security Centre (ACSC) Information Security Manual (ISM) + that align to the Australian Cyber Security Centre (ACSC) Information Security Manual (ISM)
+ with the applicability marking of OFFICIAL. + with the applicability marking of OFFICIAL.
+ +
+ The ISM uses a risk-based approach to cyber security. This profile provides a guide to aligning + The ISM uses a risk-based approach to cyber security. This profile provides a guide to aligning
+ Red Hat Enterprise Linux security controls with the ISM, which can be used to select controls + AlmaLinux OS security controls with the ISM, which can be used to select controls
+ specific to an organisation's security posture and risk profile. + specific to an organisation's security posture and risk profile.
+ +
+ A copy of the ISM can be found at the ACSC website: + A copy of the ISM can be found at the ACSC website: