Bug 2228455 - content_rule_audit_rules_login_events_faillock not selected on DISA STIG Profile [rhel-8.8.0.z]
Summary: content_rule_audit_rules_login_events_faillock not selected on DISA STIG Prof...
Keywords:
Status: MODIFIED
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: scap-security-guide
Version: 8.7
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Jan Černý
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On: 2167999
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-08-02 12:17 UTC by RHEL Program Management Team
Modified: 2023-08-11 12:41 UTC (History)
8 users (show)

Fixed In Version: scap-security-guide-0.1.69-1.el8_8
Doc Type: If docs needed, set a value
Doc Text:
The DISA STIG profile for Red Hat Enterprise Linux 8 contains a new rule audit_rules_login_events_faillock, which references STIG ID RHEL-08-030590. The rule checks whether the audit daemon is configured to record any attempts to modify logon events logs stored in /var/log/faillock.
Clone Of: 2167999
Environment:
Last Closed:
Type: ---
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-164133 0 None None None 2023-08-02 12:19:08 UTC


Note You need to log in before you can comment on or make changes to this bug.