Bug 2079217
| Summary: | Update RHEL7 DISA STIG profile to V3R7 [rhel-7.9.z] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Watson Yuuma Sato <wsato> |
| Component: | scap-security-guide | Assignee: | Watson Yuuma Sato <wsato> |
| Status: | CLOSED ERRATA | QA Contact: | Milan Lysonek <mlysonek> |
| Severity: | medium | Docs Contact: | Jan Fiala <jafiala> |
| Priority: | medium | ||
| Version: | 7.9 | CC: | ggasparb, jafiala, kpfleming, mhaicman, mlysonek, wsato |
| Target Milestone: | rc | Keywords: | Triaged, ZStream |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | scap-security-guide-0.1.57-7.el7_9 | Doc Type: | Enhancement |
| Doc Text: |
.Profiles for DISA STIG version v3r7
The Defense Information Systems Agency (DISA) has published an updated version of the Secure Technical Implementation Guide (STIG) for RHEL 7 version 3, release 7.
The changes from V3R6 to V3R7 are very small and the `DISA STIG for Red Hat Enterprise Linux 7` profile remains aligned.
Use only the current version of this profile because the older versions of this profile are no longer valid.
WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-05-18 16:16:32 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Watson Yuuma Sato
2022-04-27 08:34:30 UTC
The change from V3R6 to V3R7 is very small and does not require content changes. This update is will consist of profile title and documentation updates. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:4647 |