Update AlmaLinux patch
This commit is contained in:
parent
c085c65ede
commit
ded0879b35
@ -30441,7 +30441,7 @@ index 00000000..2e8a33d3
|
||||
+ - audit_rules_usergroup_modification_shadow
|
||||
diff --git a/products/almalinux8/profiles/ism_o.profile b/products/almalinux8/profiles/ism_o.profile
|
||||
new file mode 100644
|
||||
index 00000000..2a281cdc
|
||||
index 00000000..c1af5712
|
||||
--- /dev/null
|
||||
+++ b/products/almalinux8/profiles/ism_o.profile
|
||||
@@ -0,0 +1,135 @@
|
||||
@ -30458,12 +30458,12 @@ index 00000000..2a281cdc
|
||||
+title: 'Australian Cyber Security Centre (ACSC) ISM Official'
|
||||
+
|
||||
+description: |-
|
||||
+ This profile contains configuration checks for AlmaLinux 8
|
||||
+ This profile contains configuration checks for AlmaLinux OS 8
|
||||
+ that align to the Australian Cyber Security Centre (ACSC) Information Security Manual (ISM)
|
||||
+ with the applicability marking of OFFICIAL.
|
||||
+
|
||||
+ The ISM uses a risk-based approach to cyber security. This profile provides a guide to aligning
|
||||
+ Red Hat Enterprise Linux security controls with the ISM, which can be used to select controls
|
||||
+ AlmaLinux OS security controls with the ISM, which can be used to select controls
|
||||
+ specific to an organisation's security posture and risk profile.
|
||||
+
|
||||
+ A copy of the ISM can be found at the ACSC website:
|
||||
|
Loading…
Reference in New Issue
Block a user